Home / Series / Chaos Communication Congress / Aired Order / Season 39 / Episode 26

To sign or not to sign: Practical vulnerabilities in GPG & friends

Might contain zerodays. https://gpg.fail/ From secure communications to software updates: PGP implementations such as *GnuPG* ubiquitously relied on to provide cryptographic assurances. Many applications from secure communications to software updates fundamentally rely on these utilities. Since these have been developed for decades, one might expect mature codebases, a multitude of code audit reports, and extensive continuous testing. When looking into various PGP-related codebases for some personal use cases, we found these expectations not met, and discovered multiple vulnerabilities in cryptographic utilities, namely in *GnuPG*, *Sequoia PGP*, *age*, and *minisign*. The vulnerabilities have implementation bugs at their core, for example in parsing code, rather than bugs in the mathematics of the cryptography itself.

English
  • Originally Aired December 27, 2025
  • Runtime 60 minutes
  • Production Code 1854
  • Created December 22, 2025 by
    r4m3u5
  • Modified December 27, 2025 by
    r4m3u5