Have a CVE ID been requested? If not Red Hat CNA can assing one.

Please let us know.

On Tue, Jan 27, 2026 at 2:40 PM Sam James <[email protected]> wrote:

> GnuPG 2.5.17 has been released to fix a possible RCE:
> * https://dev.gnupg.org/T8044 ("gpg-agent stack buffer overflow in
> pkdecrypt using KEM")
>
> [Description for this one at the end, for the full quoted advisory.]
>
> There's two other security-relevant bugs too:
> * https://dev.gnupg.org/T8045 ("Stack-based buffer overflow in TPM2
> `PKDECRYPT`")
>
> > A stack-based buffer overflow exists in GnuPG’s tpm2daemon when handling
> > the PKDECRYPT command for TPM-backed RSA and ECC keys. A local attacker
> > who can access the daemon’s Assuan socket can send an oversized
> ciphertext
> > and trigger memory corruption, resulting in a crash and potentially
> > arbitrary code execution. When a user stores private keys inside a TPM,
> > GnuPG runs a helper process called tpm2daemon to perform cryptographic
> > operations on their behalf. Other GnuPG components communicate with this
> > daemon over Assuan, a local IPC protocol. During a PKDECRYPT request,
> > tpm2daemon copies the attacker-supplied ciphertext into fixed-size TPM
> > work buffers without validating that the ciphertext fits. If the supplied
> > ciphertext is larger than the TPM buffer, the copy operation writes past
> > the end of the stack buffer and corrupts adjacent stack memory. This
> > affects both supported TPM decrypt paths: RSA (tpm2_rsa_decrypt) and ECC
> > (tpm2_ecc_decrypt). Because the overflow occurs on the stack and is
> > attacker-controlled, it is potentially exploitable for code execution
> > inside the tpm2daemon process.
>
> * https://dev.gnupg.org/T8049 ("Null pointer dereference with overlong
> signature packet")
>
> > Overlong signature packet length causes parse_signature to return
> > success with sig->data[] left NULL, leading to a crash in later
> > consumers.
>
> The advisory is at https://dev.gnupg.org/T7996#212268 (not yet on
> gnupg-announce ML). Quoting that, which discusses the main bug (T8044):
>
> > These versions are affected:
> >
> >    GnuPG 2.5.16 (released 2025-12-30)
> >    GnuPG 2.5.15 (released 2025-12-29)
> >    GnuPG 2.5.14 (released 2025-11-19)
> >    GnuPG 2.5.13 (released 2025-10-22)
> >    Gpg4win 5.0.0 (released 2026-01-14)
> >    Gpg4win 5.0.0-beta479 (released 2026-01-02)
> >    Gpg4win 5.0.0-beta476 (released 2025-12-22)
> >    Gpg4win 5.0.0-beta395 (released 2025-10-22)
> >
> > All other versions are not affected.
> >
> > A crafted CMS (S/MIME) EnvelopedData message carrying an oversized
> > wrapped session key can cause a stack buffer overflow in gpg-agent
> > during the PKDECRYPT--kem=CMS handling. This can easily be used for a
> > DoS but, worse, the memory corruption can very likley also be used to
> > mount a remote code execution attack.
> >
> > A CVE-id has not been assigned. We track this bug as T8044 under
> > https://dev.gnupg.org/T8044. This vulnerability was discovered by:
> > OpenAI Security Research. Their report was received on 2026-01-18;
> > fixed versions released 2026-01-27.
> >
> > Solution:
> >
> > If an affected GnuPG version is used please update ASAP to the new
> > version 2.5.17.
> >
> > If an affected version of Gpg4win is used please update ASAP to the new
> > version 5.0.1.
> >
> > If an immediate update is not possible please remove the gpgsm or
> > gpgsm.exe binary, this way the the bug can't be remotely triggered.
>
> sam
>


-- 
Pedro Sampaio | Red Hat Product Security
851525C5A98E9DEB7E650ABDFAC8296FBC674B8F

Reply via email to