CVE-2019-18874 (https://nvd.nist.gov/vuln/detail/CVE-2019-18874): psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
Keywords for dev-python/psutil: | | u | | a a a p s r | n | | l m r i p h m s p i m | e u s | r | p d a m a p c x p 6 3 a s i | a s l | e | h 6 r 6 6 p 6 8 p 8 9 s r c p | p e o | p | a 4 m 4 4 c 4 6 a k 0 h c v s | i d t | o ---------+-------------------------------+-------+------- 5.4.8 | ~ ~ ~ ~ ~ ~ ~ ~ ~ o ~ o ~ o o | 7 # 0 | gentoo 5.5.0 | + + + + + + + + ~ o + o + o o | 7 o | gentoo 5.6.0 | ~ + + ~ ~ + + + ~ o + o ~ o o | 7 o | gentoo [I]5.6.5 | ~ ~ ~ ~ ~ ~ ~ ~ ~ o ~ o ~ o o | 7 # | gentoo 5.6.7 | ~ ~ ~ ~ ~ ~ ~ ~ ~ o ~ o ~ o o | 7 o | gentoo
amd64 stable
x86 stable
sparc stable
ppc64 stable
ia64 stable
arm64 stable
s390 stable
ppc stable
arm stable
Tree is clean.
Not releasing a GLSA for this one: To trigger this flaw, an attacker would require privileges to modify network address, manipulate users, network interfaces and/or disk partitions. All if this require super user privileges already. Repository is clean, all done.