A double free when handling responses in read_file in tools/egk-tool.c (aka the eGK card tool) in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Opensc | Opensc_project | * | 0.18.0 (including) |
Opensc | Ubuntu | bionic | * |
Opensc | Ubuntu | cosmic | * |
Opensc | Ubuntu | esm-apps/bionic | * |
Opensc | Ubuntu | esm-apps/xenial | * |
Opensc | Ubuntu | trusty | * |
Opensc | Ubuntu | upstream | * |
Opensc | Ubuntu | xenial | * |