[Pkg-gnupg-maint] [SRM] Update of gnupg/gnupg2 to fix a memory leak (was: Bug#345911: gnupg: Memory leak fix)

Eric Dorland eric at debian.org
Sat May 23 21:30:07 UTC 2009


* Daniel Leidert (daniel.leidert.spam at gmx.net) wrote:
> Hi,
> 
> In the past it had been reported several times, that importing a large
> keyring (for example the Debian keyring) might need a really long time
> and make gnupg allocate much memory (trying to reproduce the issue I
> observed a DoS). I recently reported the issue to Werner Koch and he
> found a memory leak and fixed the issue. It seems the patch applies to
> gnupg (probably to 1.4.6 in oldstable too) as well as gnupg2.
> 
> Should this be fixed in stable and olstable? Then I would prepare the
> packages for gnupg (CCed Eric for gnupg2).
> 
> http://bugs.debian.org/345911 (#345911, #113897, #172115)
> https://bugs.g10code.com/gnupg/issue1034
> http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=31;filename=345911_svn4993.diff;att=1;bug=345911
> http://cvs.gnupg.org/cgi-bin/viewcvs.cgi/branches/STABLE-BRANCH-1-4/g10/keyring.c?root=GnuPG&rev=4993&r1=4963&r2=4993 (gnupg 1.4)
> http://cvs.gnupg.org/cgi-bin/viewcvs.cgi/trunk/g10/keyring.c?root=GnuPG&rev=4994&r1=4980&r2=4994 (gnupg2)
> 
> Regards, Daniel
> 

I didn't see any response to this, did anything come of it?

-- 
Eric Dorland <eric at kuroneko.ca>
ICQ: #61138586, Jabber: hooty at jabber.com

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnupg-maint/attachments/20090523/cfcc37b5/attachment.pgp>


More information about the Pkg-gnupg-maint mailing list