This handles the problem, thanks.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Feb 16 2018
Feb 16 2018
Feb 15 2018
Feb 15 2018
Yes, that is correct.
Feb 14 2018
Feb 14 2018
That's weird, I can reproduce it with a fresh pull from dev.gnupg.org (I can't clone it because it keeps giving me an error like "no rule to make target audit-events.h) by configuring with CFLAGS set to -fsantize=address -ldl and LDFLAGS set to -lasan. I added the -ldl because of a linking error with symbol dlsym (only when -fsantize=address is present). It more specifically complains about a READ access of size 1 and heap-buffer-overflow on address 0xb30037b0. It also mentions that this address is a wild pointer. The call tree looks as follows:
iobuf_temp_with_content
keybox_get_keyblock
keydb_get_keyblock
do_export_stream
do_export
export_pubkeys
main
Feb 6 2018
Feb 6 2018
jfe added a comment to T3780: Integer overflow causes heap overflow in parse_symkeyenc() in file g10/parse-packet.c.
Great, thanks for the quick response!
jfe updated the task description for T3780: Integer overflow causes heap overflow in parse_symkeyenc() in file g10/parse-packet.c.
Feb 2 2018
Feb 2 2018