Date: Mon, 4 Jul 2022 14:58:34 +0200 From: Jens-Wolfhard Schicke-Uffmann <j.schicke@...xlogic.com> To: oss-security@...ts.openwall.com Subject: Re: DO NOT OPEN PREVIOUS MAIL Re: Denial of service in GnuPG Hi, On Mon, Jul 04, 2022 at 02:15:45PM +0200, Peter van Dijk wrote: > > On 04/07/2022 07:31 Demi Marie Obenour <demi@...isiblethingslab.com> wrote: > > Signature (of /dev/null) that triggers this bug is attached, along with > > the corresponding public key. > This is insane. You can't send weaponised exploits that crash email > clients to public mailing lists. Please do not do this again. What email client would that be specifically? Because at least on my end, nothing nefarious happened. GPG was called on the outermost layer of signature and verified the email in entirety (and did so quickly). Do we have another bug lurking somewhere? Regards, Jens Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.