Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 5 Jan 2015 19:13:24 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: Re: CVE Request(s): GnuPG 2/GPG2

On Thu, Jan 01, 2015 at 07:45:52AM +1100, Joshua Rogers wrote:
> On 30/12/14 06:57, Joshua Rogers wrote:
> > Hi,
> >
> > I found multiple vulnerabilities in GPG2.
> > Could some CVE-ID(s) be assigned please.
> > Patches were provided by multiple people.
> >
> > --
> > Double free in scd/command.c:
> > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773471
> >
> > Double free in sm/minip12.c:
> > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773472
> >
> >
> > These two seem related in code:
> > Return after free in sm/gpgsm.c:
> > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773473
> > Return after free in dirmngr/ldapserver.c:
> > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773523
> > --
> >
> > Thanks,
> Any updates?

Explicitly adding cve-assign to CC.

Cheers,
        Moritz

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.