Name | CVE-2019-19480 |
Description | An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
opensc (PTS) | jessie, jessie (lts) | 0.16.0-3+deb8u3 | fixed |
| stretch (security), stretch (lts), stretch | 0.16.0-3+deb9u2 | fixed |
| buster (security), buster, buster (lts) | 0.19.0-1+deb10u3 | fixed |
| bullseye | 0.21.0-1 | fixed |
| bookworm | 0.23.0-0.3+deb12u1 | fixed |
| sid, trixie | 0.25.1-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
opensc | source | wheezy | (unfixed) | end-of-life | | |
opensc | source | (unstable) | (not affected) | | | |
Notes
- opensc <not-affected> (Vulnerable code not present)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18478
Introduced in: https://github.com/OpenSC/OpenSC/commit/630d6adf32cecaab0ee184618f56497bd50400fb
Fixed by: https://github.com/OpenSC/OpenSC/commit/6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7
The introducing commit attempted to fix a memory leak issue, and later on
further memleak issues were addressed related to those changes. But those
fixes are not related "directly" to the CVE assignment for the incorrect
free operation in sc_pkcs15_decode_prkdf_entry.