debsig-verify (0.28)
[PTS] [DDPO]
NEW: VCS has unreleased changes: 0.29 > 0.28
- Git: https://git.dpkg.org/git/dpkg/debsig-verify.git
-
- Branch: main
- Path: debian/changelog
- Repo size: 2580480
- Browser: https://git.dpkg.org/cgit/dpkg/debsig-verify.git
- Last scan: 2023-05-27 12:12:07+00
- Next scan: 2023-05-28 13:21:00+00
- Debian changelog in Git:
debsig-verify (0.29) UNRELEASED; urgency=medium
*
-- Guillem Jover <guillem@debian.org> Sun, 09 Apr 2023 23:29:55 +0200
- This branch is 3 commits ahead of tag 0.28
- Git log:
commit 758c97bca1d0352f05614c7369ad01483cdd0a5b
Author: Guillem Jover <guillem@debian.org>
Date: Sun Apr 9 23:32:17 2023 +0200
openpgp-gpg: Do not duplicate the returned value in gpg_getSigKeyID()
The field getters already return an allocated duplicate string, so there
is no need to duplicate it again, which will just cause a memory leak to
happen instead.
Warned-by: coverity
Changelog: internal
commit 63a4dd5cb71fcdb3b4837f80c7c37c0aba25638e
Author: Guillem Jover <guillem@debian.org>
Date: Sun Apr 9 23:30:28 2023 +0200
openpgp-gpg: Free fpr if there is no match in gpg_getKeyID()
If we found a fingerprint, but then that didn't match it or a subsequent
uid, then we could end up leaking fpr.
Warned-by: coverity
Changelog: internal
commit 34c9fbdaba38f8e00db2dc35897828097ffe5ebf
Author: Guillem Jover <guillem@debian.org>
Date: Sun Apr 9 23:30:08 2023 +0200
Bump version to 0.29