MGASA-2017-0026

Source
https://advisories.mageia.org/MGASA-2017-0026.html
Import Source
https://advisories.mageia.org/MGASA-2017-0026.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0026
Related
Published
2017-01-27T20:30:52Z
Modified
2017-01-27T20:20:03Z
Summary
Updated pcsc-lite packages fix security vulnerability
Details

Once MSGRemoveContext is invoked (via SCARDRELEASECONTEXT), cardsList is freed. A repeated invocation of SCARDRELEASECONTEXT (with an empty context handle) results in a use-after-free followed by a double-free.

After MSGRemoveContext, invocation of SCardEstablishContext enable further use-after-free of cardsList in MSGCheckHandleAssociation, MSGRemoveContext, MSGAddHandle, MSGRemoveHandle.

To avoid this problem, destroy the list only when the client connection is terminated. (CVE-2016-10109)

References
Credits

Affected packages

Mageia:5 / pcsc-lite

Package

Name
pcsc-lite
Purl
pkg:rpm/mageia/pcsc-lite?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.11-4.1.mga5

Ecosystem specific

{
    "section": "core"
}