An issue was discovered in Yubico libykpiv before 2.1.0. An attacker can trigger an incorrect free() in the ykpiv_util_generate_key() function in lib/util.c through incorrect error handling code. This could be used to cause a denial of service attack.
The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libykpiv | Yubico | * | 2.1.0 (excluding) |
Yubico-piv-tool | Ubuntu | bionic | * |
Yubico-piv-tool | Ubuntu | eoan | * |
Yubico-piv-tool | Ubuntu | groovy | * |
Yubico-piv-tool | Ubuntu | trusty | * |
Yubico-piv-tool | Ubuntu | xenial | * |
This weakness can take several forms, such as: