Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <aXkZe4SPTxXKAUGX@netmeister.org>
Date: Tue, 27 Jan 2026 15:00:59 -0500
From: Jan Schaumann <jschauma@...meister.org>
To: oss-security@...ts.openwall.com
Subject: Re: GnuPG security release

Sam James <sam@...too.org> wrote:

> > A crafted CMS (S/MIME) EnvelopedData message carrying an oversized
> > wrapped session key can cause a stack buffer overflow in gpg-agent
> > during the PKDECRYPT--kem=CMS handling. This can easily be used for a
> > DoS but, worse, the memory corruption can very likley also be used to
> > mount a remote code execution attack.
> >
> > A CVE-id has not been assigned. We track this bug as T8044 under
> > https://dev.gnupg.org/T8044. This vulnerability was discovered by:
> > OpenAI Security Research. Their report was received on 2026-01-18;

This vulnerability sounds very similar to the just
announced OpenSSL vulnerability CVE-2025-15467.  That
vulnerability was noted as having been discovered
Stanislav Fort (Aisle Research).

Is it a coincident that these two issues were detected
shortly after one another by different parties?

-Jan

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.