Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 5 Jan 2015 12:42:41 -0500 (EST)
From: cve-assign@...re.org
To: Joshua Rogers <honey@...ernot.info>
cc: oss-security@...ts.openwall.com
Subject: Re: CVE Request(s): GnuPG 2/GPG2


On Tue, 30 Dec 2014, Joshua Rogers wrote:

> I found multiple vulnerabilities in GPG2.
> Could some CVE-ID(s) be assigned please.
> Patches were provided by multiple people.
>
> --
> Double free in scd/command.c:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773471
>
> Double free in sm/minip12.c:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773472

What is the attack scenario for these double frees?  It is not immediately 
clear whether there is a role for an attacker who is not the GnuPG user.

---

CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.