|
|
Message-ID: <CAEFhzs_+x1hEAHWqJsDR1j-Gfso9hOSmmGfN2unF4fqxcVKwEg@mail.gmail.com>
Date: Tue, 27 Jan 2026 15:46:18 -0300
From: Pedro Sampaio <psampaio@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: GnuPG security release
Have a CVE ID been requested? If not Red Hat CNA can assing one.
Please let us know.
On Tue, Jan 27, 2026 at 2:40 PM Sam James <sam@...too.org> wrote:
> GnuPG 2.5.17 has been released to fix a possible RCE:
> * https://dev.gnupg.org/T8044 ("gpg-agent stack buffer overflow in
> pkdecrypt using KEM")
>
> [Description for this one at the end, for the full quoted advisory.]
>
> There's two other security-relevant bugs too:
> * https://dev.gnupg.org/T8045 ("Stack-based buffer overflow in TPM2
> `PKDECRYPT`")
>
> > A stack-based buffer overflow exists in GnuPG’s tpm2daemon when handling
> > the PKDECRYPT command for TPM-backed RSA and ECC keys. A local attacker
> > who can access the daemon’s Assuan socket can send an oversized
> ciphertext
> > and trigger memory corruption, resulting in a crash and potentially
> > arbitrary code execution. When a user stores private keys inside a TPM,
> > GnuPG runs a helper process called tpm2daemon to perform cryptographic
> > operations on their behalf. Other GnuPG components communicate with this
> > daemon over Assuan, a local IPC protocol. During a PKDECRYPT request,
> > tpm2daemon copies the attacker-supplied ciphertext into fixed-size TPM
> > work buffers without validating that the ciphertext fits. If the supplied
> > ciphertext is larger than the TPM buffer, the copy operation writes past
> > the end of the stack buffer and corrupts adjacent stack memory. This
> > affects both supported TPM decrypt paths: RSA (tpm2_rsa_decrypt) and ECC
> > (tpm2_ecc_decrypt). Because the overflow occurs on the stack and is
> > attacker-controlled, it is potentially exploitable for code execution
> > inside the tpm2daemon process.
>
> * https://dev.gnupg.org/T8049 ("Null pointer dereference with overlong
> signature packet")
>
> > Overlong signature packet length causes parse_signature to return
> > success with sig->data[] left NULL, leading to a crash in later
> > consumers.
>
> The advisory is at https://dev.gnupg.org/T7996#212268 (not yet on
> gnupg-announce ML). Quoting that, which discusses the main bug (T8044):
>
> > These versions are affected:
> >
> > GnuPG 2.5.16 (released 2025-12-30)
> > GnuPG 2.5.15 (released 2025-12-29)
> > GnuPG 2.5.14 (released 2025-11-19)
> > GnuPG 2.5.13 (released 2025-10-22)
> > Gpg4win 5.0.0 (released 2026-01-14)
> > Gpg4win 5.0.0-beta479 (released 2026-01-02)
> > Gpg4win 5.0.0-beta476 (released 2025-12-22)
> > Gpg4win 5.0.0-beta395 (released 2025-10-22)
> >
> > All other versions are not affected.
> >
> > A crafted CMS (S/MIME) EnvelopedData message carrying an oversized
> > wrapped session key can cause a stack buffer overflow in gpg-agent
> > during the PKDECRYPT--kem=CMS handling. This can easily be used for a
> > DoS but, worse, the memory corruption can very likley also be used to
> > mount a remote code execution attack.
> >
> > A CVE-id has not been assigned. We track this bug as T8044 under
> > https://dev.gnupg.org/T8044. This vulnerability was discovered by:
> > OpenAI Security Research. Their report was received on 2026-01-18;
> > fixed versions released 2026-01-27.
> >
> > Solution:
> >
> > If an affected GnuPG version is used please update ASAP to the new
> > version 2.5.17.
> >
> > If an affected version of Gpg4win is used please update ASAP to the new
> > version 5.0.1.
> >
> > If an immediate update is not possible please remove the gpgsm or
> > gpgsm.exe binary, this way the the bug can't be remotely triggered.
>
> sam
>
--
Pedro Sampaio | Red Hat Product Security
851525C5A98E9DEB7E650ABDFAC8296FBC674B8F
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.