Release: 1.4.2.2
Environment
x86 desktop (Pentium 3), Linux x86 (Ubuntu 6.06 development version).
Description
This bug was reported into the Ubuntu bug tracking system at https://launchpad.net/distros/ubuntu/+source/gnupg/+bug/39459
The description of the problem is:
create a key pair for bob : "gpg --gen-key"
edit your key pair : "gpg --edit-key bob"
Command> trust
pub 1024D/2B4A07C1 created: 2006-04-13 expires: 2006-04-14 usage: CS
trust: ultimate validity: ultimate
sub 1024g/9248B874 created: 2006-04-13 expires: 2006-04-14 usage: E
[ultimate] (1). Dumpy Dump (DELETE ME) <dumpdump@dodgeit.com>
Please decide how far you trust this user to correctly verify other users' keys
(by looking at passports, checking fingerprints from different sources, etc.)
1 = I don't know or won't say 2 = I do NOT trust 3 = I trust marginally 4 = I trust fully 5 = I trust ultimately m = back to the main menu
Your decision? 0
gpg: Ohhhh jeeee: ... this is a bug (../../g10/pkclist.c:315:do_edit_ownertrust)secmem usage: 1408/1408 bytes in 2/2 blocks of pool 1408/32768
Abandon
Fix
Apply the attached patch.