File: gpg.fail.md

package info (click to toggle)
gnupg2 2.4.9-2
  • links: PTS, VCS
  • area: main
  • in suites: experimental
  • size: 48,752 kB
  • sloc: ansic: 287,657; sh: 7,938; lisp: 6,735; makefile: 1,982; awk: 160; xml: 53; python: 16; sed: 16; php: 14; perl: 13
file content (105 lines) | stat: -rw-r--r-- 3,158 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
# Tracking [gpg.fail](https://gpg.fail/) issue status

## 1 https://gpg.fail/detached
Multiple Plaintext Attack on Detached PGP Signatures in GnuPG
* Upstream issue: https://dev.gnupg.org/T7903
* Upstream response: unknown status 2.2 / 2.4.8+git / master
* CVE: N/A
* Bug-Debian: 
* Debian-Status: fixed in 2.4.8-5 and 2.4.7-21+deb13u1 and 2.2.40-1.1+deb12u2

## 2 https://gpg.fail/filename
  GnuPG Accepts Path Separators and Path Traversals in Literal Data "Filename" Field
* Upstream issue: https://dev.gnupg.org/T7908
* Upstream response: unfixed 2.2 / unfixed 2.4 / master
* CVE: 
* Bug-Debian: 
* Debian-Status: fixed in 2.4.8-6 and 2.4.7-21+deb13u1 and 2.2.40-1.1+deb12u2

## 3 https://gpg.fail/formfeed
  Cleartext Signature Plaintext Truncated for Hash Calculation
* Upstream issue: 
* Upstream response: 
* CVE: CVE-2025-68972
* Bug-Debian: https://bugs.debian.org/1124220
* Debian-Status: 

## 4 https://gpg.fail/malleability
  Encrypted message malleability checks are incorrectly enforced causing plaintext recovery attacks
* Upstream issue: 
* Upstream response: 
* CVE: 
* Bug-Debian: 
* Debian-Status: 

## 5 https://gpg.fail/memcpy
  Memory Corruption in ASCII-Armor Parsing
* Upstream issue: https://dev.gnupg.org/T7906
* Upstream response: fixed 2.2.51 / fixed 2.4.8+git / master
* CVE: CVE-2025-68973
* Debian-Bug: https://bugs.debian.org/1124221
* Debian-Status: fixed in 2.4.8-5 and 2.4.7-21+deb13u1 and 2.2.40-1.1+deb12u2

## 6 https://gpg.fail/minisign
  Trusted comment injection (minisign)
* not relevant for gnupg - minisign -issue

## 7 https://gpg.fail/notdash
  Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG
* Upstream issue: 
* Upstream response: 
* CVE: 
* Bug-Debian: 
* Debian-Status: 

## 8 https://gpg.fail/notsoclear
  OpenPGP Cleartext Signature Framework Susceptible to Format Confusion
* Upstream issue: 
* Upstream response: 
* CVE: 
* Bug-Debian: 
* Debian-Status: 

## 9 https://gpg.fail/noverify
  GnuPG Output Fails To Distinguish Signature Verification Success From Message Content
* Upstream issue: 
* Upstream response: 
* CVE: 
* Bug-Debian: 
* Debian-Status: 

## 10 https://gpg.fail/nullbyte
  Cleartext Signature Forgery in GnuPG
* Upstream issue: https://dev.gnupg.org/T7902
* Upstream response: open
* CVE: 
* Bug-Debian: 
* Debian-Status: 

## 11 https://gpg.fail/polyglot
  Radix64 Line-Truncation Enabling Polyglot Attacks
* Upstream issue: https://dev.gnupg.org/T7905
* Upstream response: notabug,willnotfix,patchavailable
* CVE: 
* Bug-Debian: 
* Debian-Status: 

## 12 https://gpg.fail/sha1
  GnuPG may downgrade digest algorithm to SHA1 during key signature checking
* Upstream issue: https://dev.gnupg.org/T7904
* Upstream response: fixed 2.2.51 / 2.4.8+git / master
* CVE: 
* Bug-Debian: 
* Debian-Status: fixed in 2.4.8-5 and 2.4.7-21+deb13u1 and 2.2.40-1.1+deb12u2

## 13 https://gpg.fail/trust
  GnuPG Trust Packet Parsing Enables Adding Arbitrary Subkeys
* Upstream issue: 
* Upstream response: 
* CVE: 
* Bug-Debian: 
* Debian-Status: 

## 14 https://gpg.fail/trustcomment
  Trusted comment Injection (minisign)
* not relevant for gnupg - minisign -issue