gnupg (gpg14)Milestone
ActivePublic

Members

  • This project does not have any members.

Watchers

  • This project does not have any watchers.

Recent Activity

Jun 18 2018

gniibe closed T2923: trust signature domain restrictions don't work as Resolved.

It's in 2.2.4 and 1.4.23.
Closing.

Jun 18 2018, 3:36 AM · gnupg (gpg14), Bug Report

Jun 12 2018

dkg added a commit to T4018: gpg --with-colons --show-keys does not show revocation certificates: rGee1fc420fb97: gpg: Print revocation certificate details when showing with-colons..
Jun 12 2018, 8:50 AM · gnupg, Bug Report
dkg added a comment to T4018: gpg --with-colons --show-keys does not show revocation certificates.

ee1fc420fb9741b2cfaea6fa820a00be2923f514 contains a proposed fix for this.

Jun 12 2018, 8:50 AM · gnupg, Bug Report
werner triaged T4018: gpg --with-colons --show-keys does not show revocation certificates as High priority.
Jun 12 2018, 8:22 AM · gnupg, Bug Report
dkg updated the task description for T4018: gpg --with-colons --show-keys does not show revocation certificates.
Jun 12 2018, 1:11 AM · gnupg, Bug Report

Jun 11 2018

dkg created T4018: gpg --with-colons --show-keys does not show revocation certificates in the S1 Public space.
Jun 11 2018, 11:34 PM · gnupg, Bug Report
werner closed T4015: Release 1.4.23 as Resolved.
Jun 11 2018, 11:23 AM · Release Info, gnupg (gpg14), CVE
werner added a project to T4015: Release 1.4.23: Release Info.
Jun 11 2018, 9:59 AM · Release Info, gnupg (gpg14), CVE
werner created T4015: Release 1.4.23.
Jun 11 2018, 9:52 AM · Release Info, gnupg (gpg14), CVE

Jun 8 2018

werner edited projects for T4012: Diagnostic is shown with the original filename not being sanitized., added: CVE, gnupg (gpg14); removed gnupg (gpg22).

@dkg can you please take this up with Debian and other distros? See the commit for a brief description.

Jun 8 2018, 11:12 AM · gnupg, CVE, Bug Report

May 2 2018

werner closed T3898: Memory leak in g10 handle_compressed as Resolved.
May 2 2018, 8:30 PM · gnupg (gpg14), Bug Report
werner added a commit to T3898: Memory leak in g10 handle_compressed: rGd26363e4f193: gpg: Fix minor memory leak in the compress filter..
May 2 2018, 8:29 PM · gnupg (gpg14), Bug Report

Apr 13 2018

gniibe changed the status of T3898: Memory leak in g10 handle_compressed from Open to Testing.

Applied to STABLE-BRANCH-1-4, too.

Apr 13 2018, 3:24 AM · gnupg (gpg14), Bug Report
gniibe added a commit to T3898: Memory leak in g10 handle_compressed: rG0f8fd95ab32a: g10: Push compress filter only if compressed..
Apr 13 2018, 3:23 AM · gnupg (gpg14), Bug Report
gniibe added a commit to T3898: Memory leak in g10 handle_compressed: rGc31abf84659d: g10: Push compress filter only if compressed..
Apr 13 2018, 3:11 AM · gnupg (gpg14), Bug Report
gniibe claimed T3898: Memory leak in g10 handle_compressed.

Good catch. Thanks. Fixed in STABLE-BRANCH-2-2.

Apr 13 2018, 3:11 AM · gnupg (gpg14), Bug Report

Feb 5 2018

dams50 closed T3768: Decryption of RSA public key encrypted session key packet fails when encrypted session key packet length is not equal to RSA key modulus size as Resolved.
Feb 5 2018, 4:01 PM · gnupg (gpg14)
dams50 added a comment to T3768: Decryption of RSA public key encrypted session key packet fails when encrypted session key packet length is not equal to RSA key modulus size.

FYI : when submitting a buffer composed of

  • a leading 00 byte,
  • the 255 bytes encrypted session key value

to HSM/PKCS11 for decyption, decrypt returns without any errors, and returned plain session key is the one expected.

Feb 5 2018, 11:38 AM · gnupg (gpg14)

Feb 3 2018

dams50 added a comment to T3768: Decryption of RSA public key encrypted session key packet fails when encrypted session key packet length is not equal to RSA key modulus size.

Some enlightenments here because i may have not mention some info in the first place :

Feb 3 2018, 6:18 PM · gnupg (gpg14)

Feb 2 2018

dams50 added a comment to T3768: Decryption of RSA public key encrypted session key packet fails when encrypted session key packet length is not equal to RSA key modulus size.

Our HSM is a certified FIPS 140-2, sec level3, hardware module, exposing a PKCS#11 v2.30 spec compliant API.

Feb 2 2018, 3:29 PM · gnupg (gpg14)
werner added a comment to T3768: Decryption of RSA public key encrypted session key packet fails when encrypted session key packet length is not equal to RSA key modulus size.

What kind of hardware token?

Feb 2 2018, 2:38 PM · gnupg (gpg14)

Feb 1 2018

dams50 updated the task description for T3768: Decryption of RSA public key encrypted session key packet fails when encrypted session key packet length is not equal to RSA key modulus size.
Feb 1 2018, 7:45 PM · gnupg (gpg14)
dams50 edited projects for T3768: Decryption of RSA public key encrypted session key packet fails when encrypted session key packet length is not equal to RSA key modulus size, added: gnupg (gpg14); removed gnupg (gpg23).
Feb 1 2018, 7:44 PM · gnupg (gpg14)

Dec 4 2017

gniibe added a commit to T2923: trust signature domain restrictions don't work: rG0d0b9eb0d4f9: g10: Fix regexp sanitization..
Dec 4 2017, 11:55 AM · gnupg (gpg14), Bug Report
gniibe added a commit to T2923: trust signature domain restrictions don't work: rG9441946e1824: g10: Fix regexp sanitization..
Dec 4 2017, 11:55 AM · gnupg (gpg14), Bug Report
gniibe added a commit to T2923: trust signature domain restrictions don't work: rG9ba0e2c76c0c: g10: Fix regexp sanitization..
Dec 4 2017, 11:55 AM · gnupg (gpg14), Bug Report

Nov 21 2017

gniibe edited projects for T2923: trust signature domain restrictions don't work, added: gnupg (gpg14); removed gnupg (gpg23).

It's fixed in master.
It is good to backport this to GnuPG 2.2 and GnuPG 1.4.

Nov 21 2017, 6:04 AM · gnupg (gpg14), Bug Report

Nov 1 2017

gniibe closed T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity as Resolved.

OK, closed.

Nov 1 2017, 7:17 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Oct 24 2017

werner closed T2684: GPG encrypts using a key of a partial recipient match instead of exact match as Wontfix.

Won't we fixed for 1.4 and 2.0 (which is too close to EOL). Has been fixed for master; see T2359.

Oct 24 2017, 12:32 PM · gnupg (gpg14), Bug Report
gniibe closed T2738: gpg crashes when attempting to write a key to a card as Wontfix.

GnuPG 1.4 is only for old features. New features are only supported by GnuPG 2.2.

Oct 24 2017, 2:21 AM · Fedora, Bug Report, gnupg (gpg14)

Oct 22 2017

jcross added a comment to T2289: UI says “Secret key is available.” in gpg when it is not.

Same issue exists in 2.2:

Oct 22 2017, 3:39 PM · Bug Report, gnupg, gnupg (gpg20), gnupg (gpg14)

Oct 20 2017

werner closed T2289: UI says “Secret key is available.” in gpg when it is not as Wontfix.

Won't be fixed for 1.4.

Oct 20 2017, 1:25 PM · Bug Report, gnupg, gnupg (gpg20), gnupg (gpg14)
werner added a comment to T2822: gnupg 1.4 sometimes truncates pubring.gpg on SIGINT.

There should be a backup file in these cases.

Oct 20 2017, 1:06 PM · gnupg (gpg14), Bug Report, gnupg
werner added a comment to T2738: gpg crashes when attempting to write a key to a card.

I would suggest to close this as won't fix.

Oct 20 2017, 12:56 PM · Fedora, Bug Report, gnupg (gpg14)
werner closed T2736: gnupg 1.4 fixed-list-mode fails to take effect when listing keys as Wontfix.

In 2.2 we implemented --import-option show-only which dies the right thing, that is to use the reguarl key-listing code. Backporting this to 1.4 does not make sense - people should move on and use gpg 2.2.

Oct 20 2017, 12:54 PM · gnupg (gpg14), Bug Report, gnupg
werner added a comment to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.

Given that we received no info after nearly two years, shouldn't we simply assume that this bug as been fixed?

Oct 20 2017, 12:51 PM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian
werner closed T1371: Out of secure memory while generating several keys in batchmode as Resolved.

This patch was released with 1.4.22

Oct 20 2017, 12:44 PM · In Progress, Bug Report, gnupg (gpg14)

Aug 15 2017

marcus closed T3182: gnupg 1.4 built with gcc 7.0.1 fails the tests on ARM as Resolved.

It's been a month since last release, no error reports so far.

Aug 15 2017, 5:44 PM · gnupg (gpg14), asm, Bug Report

Aug 9 2017

marcus closed T1691: Charset / codepage problems in GnuPG 2.0.26 on MS Windows as Resolved.
Aug 9 2017, 4:02 PM · gnupg (gpg14), Windows 32, gnupg (gpg20), Windows, gpg4win, Bug Report, gnupg

Aug 7 2017

marcus added a comment to T3329: only document --faked-system-time for gpg 2.1 and later.

No worries :)

Aug 7 2017, 11:11 AM · gnupg (gpg14), Bug Report

Aug 5 2017

werner lowered the priority of T3330: Install gpg as gpg and not anymore as gpg2 from High to Low.

Done with commit rGa69464b0b6da.

Aug 5 2017, 3:00 PM · gnupg (gpg14)
dkg added a comment to T3329: only document --faked-system-time for gpg 2.1 and later.

ah, great! sorry i got confused :)

Aug 5 2017, 12:19 AM · gnupg (gpg14), Bug Report

Aug 4 2017

marcus added a comment to T3329: only document --faked-system-time for gpg 2.1 and later.

I only removed the documentation in the STABLE-BRANCH-1-4. Nobody said we want to remove this feature, and it is still documented in STABLE-BRANCH-2-0 and master.

Aug 4 2017, 8:42 PM · gnupg (gpg14), Bug Report
dkg added a comment to T3329: only document --faked-system-time for gpg 2.1 and later.

fwiw, faked-system-time is used in several non-gnupg packages in debian already.

Aug 4 2017, 8:39 PM · gnupg (gpg14), Bug Report
marcus closed T3329: only document --faked-system-time for gpg 2.1 and later as Resolved.

I just removed the paragraph (gpgtwoone is not used anymore anyways). Fixed in eb15d5ed8.

Aug 4 2017, 8:27 PM · gnupg (gpg14), Bug Report
marcus added a commit to T3329: only document --faked-system-time for gpg 2.1 and later: rGeb15d5ed8e4a: doc: Remove documentation for future option --faked-system-time..
Aug 4 2017, 8:26 PM · gnupg (gpg14), Bug Report
werner triaged T3329: only document --faked-system-time for gpg 2.1 and later as Normal priority.
Aug 4 2017, 6:51 PM · gnupg (gpg14), Bug Report
dkg created T3329: only document --faked-system-time for gpg 2.1 and later.
Aug 4 2017, 6:23 PM · gnupg (gpg14), Bug Report

Jul 26 2017

marcus closed T2397: error messages from gpg_keys_hkp's stderr are printed in gpg's stdout as Wontfix.

gpg 1.4 only gets important updates.

Jul 26 2017, 4:37 PM · gnupg (gpg14), Bug Report, gnupg

Jul 21 2017

marcus closed T2259: --key-gen failing on Solaris 10 as Invalid.
Jul 21 2017, 4:33 PM · gnupg, gnupg (gpg14), Bug Report