Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-7160

Опубликовано: 17 нояб. 2023
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2023-7160: opensc security and bug fix update (LOW)

[0.20.0-6]

  • Fix introduced issues tagged by coverity (RHEL-765)

[0.20.0-5]

  • Avoid potential crash because of missing list terminator (#2196234)
  • Fix CVE-2023-2977: potential buffer overrun in pkcs15 cardos_have_verifyrc_package (#2211093)
  • Backport upstream changes regarding to reader removal (#2097048)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

opensc

0.20.0-6.el8

Oracle Linux x86_64

opensc

0.20.0-6.el8

Связанные CVE

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

CVSS3: 6.3
redhat
около 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

CVSS3: 7.1
nvd
около 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

CVSS3: 7.1
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 7.1
debian
около 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer ...