Bug 1178120 - (CVE-2020-13132) VUL-1: CVE-2020-13132: yubico-piv-tool: incorrect free() in the ykpiv_util_generate_key() in lib/util.c through incorrect error handling code could result in DoS
(CVE-2020-13132)
VUL-1: CVE-2020-13132: yubico-piv-tool: incorrect free() in the ykpiv_util_ge...
Status: RESOLVED WONTFIX
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/263076/
CVSSv3.1:SUSE:CVE-2020-13132:4.6:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-10-26 09:53 UTC by Wolfgang Frisch
Modified: 2021-11-18 18:24 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2020-10-26 09:53:10 UTC
CVE-2020-13132

An issue was discovered in Yubico libykpiv before 2.1.0. An attacker can trigger an incorrect free() in the ykpiv_util_generate_key() function in lib/util.c through incorrect error handling code. This could be used to cause a denial of service attack.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1890964
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13132
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-13132.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13132
https://www.yubico.com/support/security-advisories/ysa-2020-02/
https://blog.inhq.net/posts/yubico-libykpiv-vuln/
Comment 2 Wolfgang Frisch 2021-07-26 16:54:23 UTC
openSUSE:Factory is already fixed.
SUSE:SLE-15-SP1:Update needs an update.
Comment 3 Wolfgang Frisch 2021-11-18 18:24:03 UTC
Not LTSS-worthy.