Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 4 Jul 2022 14:58:34 +0200
From: Jens-Wolfhard Schicke-Uffmann <j.schicke@...xlogic.com>
To: oss-security@...ts.openwall.com
Subject: Re: DO NOT OPEN PREVIOUS MAIL Re: 
 Denial of service in  GnuPG

Hi,

On Mon, Jul 04, 2022 at 02:15:45PM +0200, Peter van Dijk wrote:
> > On 04/07/2022 07:31 Demi Marie Obenour <demi@...isiblethingslab.com> wrote:
> > Signature (of /dev/null) that triggers this bug is attached, along with
> > the corresponding public key.
> This is insane. You can't send weaponised exploits that crash email
> clients to public mailing lists. Please do not do this again.
What email client would that be specifically? Because at least on
my end, nothing nefarious happened. GPG was called on the outermost
layer of signature and verified the email in entirety (and did so
quickly).

Do we have another bug lurking somewhere?


Regards,
  Jens

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.