{"id":"CVE-2019-18874","details":"psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.","aliases":["GHSA-qfc5-mcwq-26q8","PYSEC-2019-41"],"modified":"2026-04-10T04:16:13.254214Z","published":"2019-11-12T02:15:10.343Z","related":["ALSA-2021:4162","ALSA-2021:4324","MGASA-2019-0370","SUSE-RU-2020:2072-1","SUSE-SU-2019:3068-1","SUSE-SU-2020:1901-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLETTJYZL2SMBUI4Q2NGBMGPDPP54SRG/"},{"type":"WEB","url":"https://usn.ubuntu.com/4204-1/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00018.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2P7QI7MOTZTFXQYU23CP3RAWXCERMOAS/"},{"type":"ADVISORY","url":"https://github.com/giampaolo/psutil/pull/1616"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/giampaolo/psutil","events":[{"introduced":"0"},{"last_affected":"b17eda56735b1e93a907355b4436f118d1333a37"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.6.5"}]}}],"versions":["release-0.1.0","release-0.1.1","release-0.1.2","release-0.1.3","release-0.2.0","release-0.2.1","release-0.3.0","release-0.4.0","release-0.4.1","release-0.5.0","release-0.5.1","release-0.6.0","release-0.6.1","release-0.7.0","release-0.7.1","release-1.0.0","release-1.0.1","release-2.0.0","release-2.1.0","release-2.1.1","release-2.1.2","release-2.1.3","release-3.0.0","release-3.0.1","release-3.1.0","release-3.1.1","release-3.2.0","release-3.2.1","release-3.2.2","release-3.3.0","release-3.4.1","release-3.4.2","release-4.0.0","release-4.1.0","release-4.2.0","release-4.3.0","release-4.3.1","release-4.4.0","release-4.4.1","release-4.4.2","release-5.0.0","release-5.0.1","release-5.1.0","release-5.1.1","release-5.1.2","release-5.1.3","release-5.2.0","release-5.2.1","release-5.2.2","release-5.3.0","release-5.3.1","release-5.4.0","release-5.4.1","release-5.4.2","release-5.4.3","release-5.4.4","release-5.4.5","release-5.4.6","release-5.4.7","release-5.4.8","release-5.5.0","release-5.5.1","release-5.6.0","release-5.6.1","release-5.6.2","release-5.6.4","release-5.6.5","v0.1.0","v0.1.1","v0.1.2","v0.1.3","v0.2.0","v0.2.1","v0.3.0","v0.4.0","v0.4.1","v0.5.0","v0.5.1","v0.6.0","v0.6.1","v0.7.0","v0.7.1","v1.0.0","v1.0.1","v2.0.0","v2.1.0","v2.1.1","v2.1.2","v2.1.3","v3.0.0","v3.0.1","v3.1.0","v3.1.1","v3.2.0","v3.2.1","v3.2.2","v3.3.0","v3.4.1","v3.4.2","v4.0.0","v4.1.0","v4.2.0","v4.3.0","v4.3.1","v4.4.0","v4.4.1","v4.4.2","v5.0.0","v5.0.1","v5.1.0","v5.1.1","v5.1.2","v5.1.3","v5.2.0","v5.2.1","v5.2.2","v5.3.0","v5.3.1","v5.4.0","v5.4.1","v5.4.2","v5.4.3","v5.4.4","v5.4.5","v5.4.6","v5.4.7","v5.4.8","v5.5.0","v5.5.1","v5.6.0","v5.6.1","v5.6.2","v5.6.4","v5.6.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-18874.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}