Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-6587

Опубликовано: 11 нояб. 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-6587: opensc security update (LOW)

[0.23.0-2]

  • Fix regression in handling OpenPGP cards
  • Fix CVE-2023-2977: buffer overrun in pkcs15init for cardos

[0.23.0-1]

  • Rebase to latest 0.23.0 release (#2100409)
  • Use separate OpenSSL context to work better from inside of OpenSSL providers

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

opensc

0.23.0-2.el9

Oracle Linux x86_64

opensc

0.23.0-2.el9

Связанные CVE

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

CVSS3: 6.3
redhat
больше 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

CVSS3: 7.1
nvd
больше 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

CVSS3: 7.1
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 7.1
debian
больше 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer ...