|Summary:||dev-libs/opensc-0.19.0: memleak in libopensc|
|Product:||Gentoo Security||Reporter:||psp <gentoo-bugzilla>|
|Component:||Vulnerabilities||Assignee:||Gentoo Security <security>|
|Whiteboard:||B3 [noglsa cve]|
|Runtime testing required:||---|
Description psp 2019-01-29 01:18:10 UTC
sc_context_create in ctx.c in libopensc in OpenSC 0.19.0 has a memory leak, as demonstrated by a call from eidenv.
Comment 1 Yury German 2019-04-27 06:23:19 UTC
More information on the vulnerability here: https://bugzilla.redhat.com/show_bug.cgi?id=1668933 https://github.com/OpenSC/OpenSC/issues/1586
Comment 2 Alon Bar-Lev 2019-04-27 06:42:50 UTC
Having a leak in command-line tool just before exit is hardly a security issue, I am not even going to patch it.  https://github.com/OpenSC/OpenSC/commit/0d7967549751b7032f22b437106b41444aff0ba9
Comment 3 Aaron Bauman 2019-04-27 14:41:03 UTC
(In reply to Alon Bar-Lev from comment #2) > Having a leak in command-line tool just before exit is hardly a security > issue, I am not even going to patch it. > >  > https://github.com/OpenSC/OpenSC/commit/ > 0d7967549751b7032f22b437106b41444aff0ba9 Agreed. Even if the CVE authorities haven't done so yet... I am marking this as invalid, but I do expect MITRE and friends to do the same shortly.