Your message dated Tue, 17 Feb 2015 22:03:41 +0000 with message-id <[email protected]> and subject line Bug#773471: fixed in gnupg2 2.0.26-5 has caused the Debian Bug report #773471, regarding Fwd: Double free to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 773471: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773471 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: gnupg2 Version: 2.1.1 Severity: normal Hi, In scd/command.c, 'cert' is freed twice. Not sure of lines, so I'll copy and paste the code. > rc = ksba_cert_new (&kc); if (rc) { xfree (cert); goto leave; } > leave: ksba_cert_release (kc); xfree (cert); TEST_CARD_REMOVAL (ctrl, > rc); return rc; Thanks, -- -- Joshua Rogers <https://internot.info/>
--- End Message ---
--- Begin Message ---Source: gnupg2 Source-Version: 2.0.26-5 We believe that the bug you reported is fixed in the latest version of gnupg2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Kahn Gillmor <[email protected]> (supplier of updated gnupg2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 16 Feb 2015 17:45:06 -0500 Source: gnupg2 Binary: gnupg-agent scdaemon gpgsm gnupg2 gpgv2 Architecture: source Version: 2.0.26-5 Distribution: unstable Urgency: medium Maintainer: Debian GnuPG Maintainers <[email protected]> Changed-By: Daniel Kahn Gillmor <[email protected]> Description: gnupg-agent - GNU privacy guard - password agent gnupg2 - GNU privacy guard - a free PGP replacement (new v2.x) gpgsm - GNU privacy guard - S/MIME version gpgv2 - GNU privacy guard - signature verification tool (new v2.x) scdaemon - GNU privacy guard - smart card support Closes: 773415 773423 773469 773471 773472 778577 Changes: gnupg2 (2.0.26-5) unstable; urgency=medium . * import bug-fixes from upstream (Closes: #773415, #773469, #773471, #773472, #773423) * Fixes CVE-2015-1606 "Use after free, resulting from failure to skip invalid packets", CVE-2015-1607 "memcpy with overlapping ranges, resulting from incorrect bitwise left shifts" (Closes: #778577) Checksums-Sha1: 4fa69a3d72e4f7ac5e8bafb9f799ed9c0f18e3c9 2547 gnupg2_2.0.26-5.dsc b727cc5ce9af93d4184202ee61c9ced2f6d8cced 385299 gnupg2_2.0.26-5.debian.tar.bz2 Checksums-Sha256: 35eedba060463f02b8387c7949a45f8d0d7144e980870048bff11c9389207f5c 2547 gnupg2_2.0.26-5.dsc 970e224a6989717f8e4f9c4c379066a4ae7914ee7d96c627ef53871f698c0e7b 385299 gnupg2_2.0.26-5.debian.tar.bz2 Files: 992e2592fa562675d01721f6f54602a8 2547 utils optional gnupg2_2.0.26-5.dsc 3880595c81897064d6b75a9edd6fc223 385299 utils optional gnupg2_2.0.26-5.debian.tar.bz2 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQJ8BAEBCgBmBQJU47ZQXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRFQjk2OTEyODdBN0FEREUzNzU3RDkxMUVB NTI0MDFCMTFCRkRGQTVDAAoJEKUkAbEb/fpcevcQAMYREynNi5+RT2/HjU45LKkt OWIKV4EMUXEB3dVujVlWoiKrn2rqiV50B0BrKgRSoqndeeSdyx+CuS8CFZ0sqFNH 55dAt9Qfo/WsUWCiPcVg7EVinYF/nJG6ZmoFWvnPqNR6zXPCRd3rkWHVXEy4AIoL iXo3z7ZM5VEZxwPHavuBSdOu8bfPB6oIh7AHmNHqCz60qeWCjUqJSq1sMGGzGh+x +XnvhCsNz3cwVwjxG7TZENDvSso4OMQWr5HkccGSxNZNQNBuRTwVzxnEGRN0J87p pyLiaHNBZoHyK0jT4NX4Knlwb6/B9/lS2QyuhJ2pJvWFbBGWQ9FhiVrH5m1pX94M 4VcwTuY685p4E8REV+wVEiOA+MlVnLF8PLvBuYDy55nWZVfg4iU6HUzAojnRTS6c jkcqzWRIYSxSxw1JV/2z8XJZifgnpihy6nHtKptIIMtqxEZuLfpv7wxLqzUmGk3u ZoHYDtigpAH+K8nnV9Mwe6TRS1kugnFWngj1TZxboJNiSMDYsFJITMi9Nv2BzoQr hqvS61UHVb1yBlTcinZVX6sEIjcI45/PKa6Qb4cFg6uObkmOgSVmT+1Yp0eDsvO2 tK76BTx0g9AOC4JAIsuq6M46fbFlWEEMxohl0Pe7hQ5uL+jjx73LPw7GEkDiE1EM l15PDCqWUJTw0nxGxfe7 =oAqf -----END PGP SIGNATURE-----
--- End Message ---

