Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 04 Jul 2022 15:15:40 +0200
From: Peter van Dijk <peter.van.dijk@...erdns.com>
To: oss-security@...ts.openwall.com
Subject: Re: DO NOT OPEN PREVIOUS MAIL Re: 
 Denial of service in  GnuPG

On Mon, 2022-07-04 at 14:58 +0200, Jens-Wolfhard Schicke-Uffmann wrote:
> Hi,
> 
> On Mon, Jul 04, 2022 at 02:15:45PM +0200, Peter van Dijk wrote:
> > > On 04/07/2022 07:31 Demi Marie Obenour <demi@...isiblethingslab.com> wrote:
> > > Signature (of /dev/null) that triggers this bug is attached, along with
> > > the corresponding public key.
> > This is insane. You can't send weaponised exploits that crash email
> > clients to public mailing lists. Please do not do this again.
> What email client would that be specifically? Because at least on
> my end, nothing nefarious happened. GPG was called on the outermost
> layer of signature and verified the email in entirety (and did so
> quickly).

GNOME Evolution (Debian's version 3.38.3-1) hangs (interruptibly, by
navigating to another message) when trying to open the message. It
hangs completely (eventually I used the Force Quit that GNOME offered
me) when trying to reply to it.

Kind regards,
-- 
Peter van Dijk
PowerDNS.COM BV - https://www.powerdns.com/

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.