|
Message-ID: <Pine.LNX.4.64.1501051240190.8826@beijing.mitre.org> Date: Mon, 5 Jan 2015 12:42:41 -0500 (EST) From: cve-assign@...re.org To: Joshua Rogers <honey@...ernot.info> cc: oss-security@...ts.openwall.com Subject: Re: CVE Request(s): GnuPG 2/GPG2 On Tue, 30 Dec 2014, Joshua Rogers wrote: > I found multiple vulnerabilities in GPG2. > Could some CVE-ID(s) be assigned please. > Patches were provided by multiple people. > > -- > Double free in scd/command.c: > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773471 > > Double free in sm/minip12.c: > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773472 What is the attack scenario for these double frees? It is not immediately clear whether there is a role for an attacker who is not the GnuPG user. --- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.