|
|
Message-ID: <20251228042744.GA629@openwall.com> Date: Sun, 28 Dec 2025 05:27:44 +0100 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Cc: contact@....fail Subject: Re: Many vulnerabilities in GnuPG On Sat, Dec 27, 2025 at 07:29:53PM -0500, Demi Marie Obenour wrote: > https://gpg.fail lists many vulnerabilities in GnuPG, one of which > allows remote code execution. All are zero-days to the best of > my knowledge. Thanks. I wish this were brought in here by the researchers, but since it was not and since we require actual content here (not just links), let me take care of this now. The website has it nicely formatted, so I also include the HTML versions, which brings the message to just below the maximum of 1 MiB here. Who knows how long this website will stay up, but oss-security archives will probably exist decades later. The website currently says: > Slides, pocs and patches soon! > > "in the hurry of leaving i forgot the sites src at home, sorry, had to > rewrite the whole thing. expect a nicer site by tomorrow. im patching as > we speak." > - crackticker (<- to blame) > > 1. Multiple Plaintext Attack on Detached PGP Signatures in GnuPG > 2. GnuPG Accepts Path Separators and Path Traversals in Literal Data > "Filename" Field > 3. Cleartext Signature Plaintext Truncated for Hash Calculation > 4. Encrypted message malleability checks are incorrectly enforced causing > plaintext recovery attacks > 5. Memory Corruption in ASCII-Armor Parsing > 6. Trusted comment injection (minisign) > 7. Cleartext Signature Forgery in the NotDashEscaped header > implementation in GnuPG > 8. OpenPGP Cleartext Signature Framework Susceptible to Format Confusion > 9. GnuPG Output Fails To Distinguish Signature Verification Success From > Message Content > 10. Cleartext Signature Forgery in GnuPG > 11. Radix64 Line-Truncation Enabling Polyglot Attacks > 12. GnuPG may downgrade digest algorithm to SHA1 during key signature > checking > 13. GnuPG Trust Packet Parsing Enables Adding Arbitrary Subkeys > 14. Trusted comment Injection (minisign) Each of the above 14 vulnerabilities has its own web page. I attach 14 text (converted with ELinks at width 80) and 14 HTML files corresponding to them. Also included on the website is the talk video (49 minutes). This disclosure was part of the below 39C3 talk: https://fahrplan.events.ccc.de/congress/2025/fahrplan/event/to-sign-or-not-to-sign-practical-vulnerabilities-i > To sign or not to sign: Practical vulnerabilities in GPG & friends > Day 1 17:15 One en Security > Dec. 27, 2025 17:15-18:15 > > Might contain zerodays. https://gpg.fail/ From secure communications to > software updates: PGP implementations such as *GnuPG* ubiquitously > relied on to provide cryptographic assurances. Many applications from > secure communications to software updates fundamentally rely on these > utilities. Since these have been developed for decades, one might expect > mature codebases, a multitude of code audit reports, and extensive > continuous testing. When looking into various PGP-related codebases for > some personal use cases, we found these expectations not met, and > discovered multiple vulnerabilities in cryptographic utilities, namely > in *GnuPG*, *Sequoia PGP*, *age*, and *minisign*. The vulnerabilities > have implementation bugs at their core, for example in parsing code, > rather than bugs in the mathematics of the cryptography itself. A > vulnerability in a parser could for example lead to a confusion about > what data was actually signed, allowing attackers without the private > key of the signer to swap the plain text. As we initially did not start > with the intent of conducting security research, but rather were looking > into understanding some internals of key management and signatures for > personal use, we also discuss the process of uncovering these bugs. > Furthermore, we touch on the role of the OpenPGP specification, and the > disclosure process. > > Beyond the underlying mathematics of cryptographic algorithms, there is > a whole other layer of implementation code, assigning meaning to the > processed data. For example, a signature verification operation both > needs robust cryptography and assurance that the verified data is indeed > the same as was passed into the signing operation. To facilitate the > second part, software such as GnuPG implement parsing and processing > code of a standardized format. Especially when implementing a feature > rich and evolving standard, there is the risk of ambivalent > specification, and classical implementation bugs. > > The impact of the vulnerabilities we found reaches from various > signature verification bypasses, breaking encryption in transit and > encryption at rest, undermining key signatures, to exploitable memory > corruption vulnerabilities. > > Speakers of this event > 49016 does many computer adjacent things; it has a talent for breaking > them, and occasionally does security research for good in its free time. > > Liam is motivated by understanding programs in depth: taking a program > that runs and making it dance. Alexander View attachment "01-detached.txt" of type "text/plain" (17265 bytes) View attachment "02-filename.txt" of type "text/plain" (23005 bytes) View attachment "03-formfeed.txt" of type "text/plain" (7862 bytes) View attachment "04-malleability.txt" of type "text/plain" (32324 bytes) View attachment "05-memcpy.txt" of type "text/plain" (16896 bytes) View attachment "06-minisign.txt" of type "text/plain" (4019 bytes) View attachment "07-notdash.txt" of type "text/plain" (6316 bytes) View attachment "08-notsoclear.txt" of type "text/plain" (23792 bytes) View attachment "09-noverify.txt" of type "text/plain" (15527 bytes) View attachment "10-nullbyte.txt" of type "text/plain" (11484 bytes) View attachment "11-polyglot.txt" of type "text/plain" (8315 bytes) View attachment "12-sha1.txt" of type "text/plain" (7045 bytes) View attachment "13-trust.txt" of type "text/plain" (17821 bytes) View attachment "14-trustcomment.txt" of type "text/plain" (3736 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.