|
|
Subscribe / Log in / New account

Mageia alert MGASA-2017-0026 (pcsc-lite)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2017-0026: Updated pcsc-lite packages fix security vulnerability
Date:  Fri, 27 Jan 2017 21:31:24 +0100
Message-ID:  <20170127203124.35EC79F7E7@duvel.mageia.org>

MGASA-2017-0026 - Updated pcsc-lite packages fix security vulnerability Publication date: 27 Jan 2017 URL: http://advisories.mageia.org/MGASA-2017-0026.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-10109 Description: Once MSGRemoveContext is invoked (via SCARD_RELEASE_CONTEXT), cardsList is freed. A repeated invocation of SCARD_RELEASE_CONTEXT (with an empty context handle) results in a use-after-free followed by a double-free. After MSGRemoveContext, invocation of SCardEstablishContext enable further use-after-free of cardsList in MSGCheckHandleAssociation, MSGRemoveContext, MSGAddHandle, MSGRemoveHandle. To avoid this problem, destroy the list only when the client connection is terminated. (CVE-2016-10109) References: - https://bugs.mageia.org/show_bug.cgi?id=20066 - http://openwall.com/lists/oss-security/2017/01/03/3 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10109 SRPMS: - 5/core/pcsc-lite-1.8.11-4.1.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds