oss-sec mailing list archives

GnuPG security release


From: Sam James <sam () gentoo org>
Date: Tue, 27 Jan 2026 16:44:11 +0000

GnuPG 2.5.17 has been released to fix a possible RCE:
* https://dev.gnupg.org/T8044 ("gpg-agent stack buffer overflow in pkdecrypt using KEM")

[Description for this one at the end, for the full quoted advisory.]

There's two other security-relevant bugs too:
* https://dev.gnupg.org/T8045 ("Stack-based buffer overflow in TPM2 `PKDECRYPT`")

A stack-based buffer overflow exists in GnuPG’s tpm2daemon when handling
the PKDECRYPT command for TPM-backed RSA and ECC keys. A local attacker
who can access the daemon’s Assuan socket can send an oversized ciphertext
and trigger memory corruption, resulting in a crash and potentially
arbitrary code execution. When a user stores private keys inside a TPM,
GnuPG runs a helper process called tpm2daemon to perform cryptographic
operations on their behalf. Other GnuPG components communicate with this
daemon over Assuan, a local IPC protocol. During a PKDECRYPT request,
tpm2daemon copies the attacker-supplied ciphertext into fixed-size TPM
work buffers without validating that the ciphertext fits. If the supplied
ciphertext is larger than the TPM buffer, the copy operation writes past
the end of the stack buffer and corrupts adjacent stack memory. This
affects both supported TPM decrypt paths: RSA (tpm2_rsa_decrypt) and ECC
(tpm2_ecc_decrypt). Because the overflow occurs on the stack and is
attacker-controlled, it is potentially exploitable for code execution
inside the tpm2daemon process.

* https://dev.gnupg.org/T8049 ("Null pointer dereference with overlong
signature packet")

Overlong signature packet length causes parse_signature to return
success with sig->data[] left NULL, leading to a crash in later
consumers.

The advisory is at https://dev.gnupg.org/T7996#212268 (not yet on
gnupg-announce ML). Quoting that, which discusses the main bug (T8044):

These versions are affected:

   GnuPG 2.5.16 (released 2025-12-30)
   GnuPG 2.5.15 (released 2025-12-29)
   GnuPG 2.5.14 (released 2025-11-19)
   GnuPG 2.5.13 (released 2025-10-22)
   Gpg4win 5.0.0 (released 2026-01-14)
   Gpg4win 5.0.0-beta479 (released 2026-01-02)
   Gpg4win 5.0.0-beta476 (released 2025-12-22)
   Gpg4win 5.0.0-beta395 (released 2025-10-22)

All other versions are not affected.

A crafted CMS (S/MIME) EnvelopedData message carrying an oversized
wrapped session key can cause a stack buffer overflow in gpg-agent
during the PKDECRYPT--kem=CMS handling. This can easily be used for a
DoS but, worse, the memory corruption can very likley also be used to
mount a remote code execution attack.

A CVE-id has not been assigned. We track this bug as T8044 under
https://dev.gnupg.org/T8044. This vulnerability was discovered by:
OpenAI Security Research. Their report was received on 2026-01-18;
fixed versions released 2026-01-27.

Solution:

If an affected GnuPG version is used please update ASAP to the new
version 2.5.17.

If an affected version of Gpg4win is used please update ASAP to the new
version 5.0.1.

If an immediate update is not possible please remove the gpgsm or
gpgsm.exe binary, this way the the bug can't be remotely triggered.

sam

Attachment: signature.asc
Description:


Current thread: