Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:3445-1

Опубликовано: 25 сент. 2024
Источник: suse-cvrf

Описание

Security update for opensc

This update for opensc fixes the following issues:

  • CVE-2024-45620: Incorrect handling of the length of buffers or files in pkcs15init. (bsc#1230076)
  • CVE-2024-45619: Incorrect handling length of buffers or files in libopensc. (bsc#1230075)
  • CVE-2024-45618: Uninitialized values after incorrect or missing checking return values of functions in pkcs15init. (bsc#1230074)
  • CVE-2024-45617: Uninitialized values after incorrect or missing checking return values of functions in libopensc. (bsc#1230073)
  • CVE-2024-45616: Uninitialized values after incorrect check or usage of APDU response values in libopensc. (bsc#1230072)
  • CVE-2024-45615: Usage of uninitialized values in libopensc and pkcs15init. (bsc#1230071)
  • CVE-2024-8443: Heap buffer overflow in OpenPGP driver when generating key. (bsc#1230364)

Список пакетов

Image SLES15-SP4-Hardened-BYOS
opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-Azure
opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-EC2
opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-GCE
opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-SAP-Hardened
opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-SAP-Hardened-Azure
opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-SAP-Hardened-BYOS
opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-SAP-Hardened-GCE
opensc-0.22.0-150400.3.12.1
Image SLES15-SP5-Hardened-BYOS-Azure
opensc-0.22.0-150400.3.12.1
Image SLES15-SP5-Hardened-BYOS-EC2
opensc-0.22.0-150400.3.12.1
Image SLES15-SP5-Hardened-BYOS-GCE
opensc-0.22.0-150400.3.12.1
Image SLES15-SP5-SAP-Hardened-Azure
opensc-0.22.0-150400.3.12.1
Image SLES15-SP5-SAP-Hardened-BYOS-Azure
opensc-0.22.0-150400.3.12.1
Image SLES15-SP5-SAP-Hardened-BYOS-EC2
opensc-0.22.0-150400.3.12.1
Image SLES15-SP5-SAP-Hardened-BYOS-GCE
opensc-0.22.0-150400.3.12.1
Image SLES15-SP5-SAP-Hardened-GCE
opensc-0.22.0-150400.3.12.1
SUSE Linux Enterprise Micro 5.3
opensc-0.22.0-150400.3.12.1
SUSE Linux Enterprise Micro 5.4
opensc-0.22.0-150400.3.12.1
SUSE Linux Enterprise Micro 5.5
opensc-0.22.0-150400.3.12.1
SUSE Linux Enterprise Module for Basesystem 15 SP5
opensc-0.22.0-150400.3.12.1
openSUSE Leap 15.5
opensc-0.22.0-150400.3.12.1
opensc-32bit-0.22.0-150400.3.12.1
openSUSE Leap Micro 5.5
opensc-0.22.0-150400.3.12.1

Описание

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. The problem is missing initialization of variables expected to be initialized (as arguments to other functions, etc.).


Затронутые продукты
Image SLES15-SP4-Hardened-BYOS-Azure:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-EC2:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-GCE:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS:opensc-0.22.0-150400.3.12.1

Ссылки

Описание

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. The following problems were caused by insufficient control of the response APDU buffer and its length when communicating with the card.


Затронутые продукты
Image SLES15-SP4-Hardened-BYOS-Azure:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-EC2:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-GCE:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS:opensc-0.22.0-150400.3.12.1

Ссылки

Описание

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized.


Затронутые продукты
Image SLES15-SP4-Hardened-BYOS-Azure:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-EC2:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-GCE:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS:opensc-0.22.0-150400.3.12.1

Ссылки

Описание

A vulnerability was found in pkcs15-init in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized.


Затронутые продукты
Image SLES15-SP4-Hardened-BYOS-Azure:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-EC2:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-GCE:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS:opensc-0.22.0-150400.3.12.1

Ссылки

Описание

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.


Затронутые продукты
Image SLES15-SP4-Hardened-BYOS-Azure:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-EC2:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-GCE:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS:opensc-0.22.0-150400.3.12.1

Ссылки

Описание

A vulnerability was found in the pkcs15-init tool in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.


Затронутые продукты
Image SLES15-SP4-Hardened-BYOS-Azure:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-EC2:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-GCE:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS:opensc-0.22.0-150400.3.12.1

Ссылки

Описание

A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution.


Затронутые продукты
Image SLES15-SP4-Hardened-BYOS-Azure:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-EC2:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS-GCE:opensc-0.22.0-150400.3.12.1
Image SLES15-SP4-Hardened-BYOS:opensc-0.22.0-150400.3.12.1

Ссылки
Уязвимость SUSE-SU-2024:3445-1