Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87y0mnj593.fsf@gentoo.org>
Date: Sun, 28 Dec 2025 10:00:08 +0000
From: Sam James <sam@...too.org>
To: oss-security@...ts.openwall.com
Subject: Re: Many vulnerabilities in GnuPG

Demi Marie Obenour <demiobenour@...il.com> writes:

> https://gpg.fail lists many vulnerabilities in GnuPG, one of which
> allows remote code execution.

> All are zero-days to the best of my knowledge.

In 2.5.14:

commit 115d138ba599328005c5321c0ef9f00355838ca9
Author:     Werner Koch <wk@...pg.org>
AuthorDate: Thu Oct 23 11:36:04 2025 +0200
Commit:     Werner Koch <wk@...pg.org>
CommitDate: Thu Oct 23 11:37:59 2025 +0200

    gpg: Fix possible memory corruption in the armor parser.

    * g10/armor.c (armor_filter): Fix faulty double increment.

    * common/iobuf.c (underflow_target): Assert that the filter
    implementations behave well.
    --

    This fixes a bug in a code path which can only be reached with special
    crafted input data and would then error out at an upper layer due to
    corrupt input (every second byte in the buffer is unitialized
    garbage).  No fuzzing has yet hit this case and we don't have a test
    case for this code path.  However memory corruption can never be
    tolerated as it always has the protential for remode code execution.

    Reported-by: 8b79fe4dd0581c1cd000e1fbecba9f39e16a396a
    Fixes-commit: c27c7416d5148865a513e007fb6f0a34993a6073
    which fixed
    Fixes-commit: 7d0efec7cf5ae110c99511abc32587ff0c45b14f

In 2.5.13:

commit 8abc320f2a75d6c7339323a3cff8a8489199f49f
Author:     Werner Koch <wk@...pg.org>
AuthorDate: Wed Oct 22 12:39:15 2025 +0200
Commit:     Werner Koch <wk@...pg.org>
CommitDate: Wed Oct 22 12:39:15 2025 +0200

    gpg: Error out on unverified output for non-detached signatures.

    * g10/mainproc.c (do_proc_packets): Never reset the any.data flag.
    --

    Fixes-commit: 3b1b6f9d98b38480ba2074158fa640b881cdb97e
    Updates-commit: 69384568f66a48eff3968bb1714aa13925580e9f
    Reported-by: 8b79fe4dd0581c1cd000e1fbecba9f39e16a396a


commit 8abc320f2a75d6c7339323a3cff8a8489199f49f
Author:     Werner Koch <wk@...pg.org>
AuthorDate: Wed Oct 22 12:39:15 2025 +0200
Commit:     Werner Koch <wk@...pg.org>
CommitDate: Wed Oct 22 12:39:15 2025 +0200

    gpg: Error out on unverified output for non-detached signatures.

    * g10/mainproc.c (do_proc_packets): Never reset the any.data flag.

commit db9705ef594d5a2baf0e95e13cf6170b621dfc51
Author:     Werner Koch <wk@...pg.org>
AuthorDate: Wed Oct 22 11:19:55 2025 +0200
Commit:     Werner Koch <wk@...pg.org>
CommitDate: Wed Oct 22 11:20:10 2025 +0200

    gpg: Avoid potential downgrade to SHA1 in 3rd party key signatures.

But it isn't clear to me what...
* the mapping between all of the vulnerabilities listed on the website is vs GnuPG commits (unfortunately
  no CVE identifiers yet either);
* GnuPG bug tracker links map to commits or vulnerabilities;
* whether these fixes are complete for a specific vulnerability or not.

The relevant public bugs I'm aware of for GnuPG are:
* https://dev.gnupg.org/T7909
* https://dev.gnupg.org/T7900
* https://dev.gnupg.org/T7902
* https://dev.gnupg.org/T7903
but some linked therein are still marked private.

Finally, to end the dump of what I know so far: Werner Koch has
published a response to the cleartext signature vulnerabilities:
https://gnupg.org/blog/20251226-cleartext-signatures.html.

sam

Download attachment "signature.asc" of type "application/pgp-signature" (419 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.