------------------------------------------------------------------------- Debian LTS Advisory DLA-4004-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Guilhem Moulin December 28, 2024 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : opensc Version : 0.21.0-1+deb11u1 CVE ID : CVE-2021-34193 CVE-2021-42778 CVE-2021-42779 CVE-2021-42780 CVE-2021-42781 CVE-2021-42782 CVE-2023-2977 CVE-2023-5992 CVE-2023-40660 CVE-2023-40661 CVE-2024-1454 CVE-2024-8443 CVE-2024-45615 CVE-2024-45616 CVE-2024-45617 CVE-2024-45618 CVE-2024-45619 CVE-2024-45620 Debian Bug : 1037021 1055521 1055522 1064189 1082853 1082859 1082860 1082861 1082862 1082863 1082864 Multiple vulnerabilities were found in opensc, a set of libraries and utilities to access smart cards, which could lead to application crash, information leak, or PIN bypass. CVE-2021-34193 Multiple stack overflow vulnerabilities were discovered in OpenSC smart card middleware via crafted responses to APDUs. CVE-2021-42778 A heap double free issue was found in sc_pkcs15_free_tokeninfo(). CVE-2021-42779 A heap use after free issue was found in sc_file_valid(). CVE-2021-42780 A use after return issue was found in the insert_pin() function, which could potentially crash programs using the library. CVE-2021-42781 Multiple heap buffer overflow issues were found in pkcs15-oberthur.c, which could potentially crash programs using the library. CVE-2021-42782 Multiple buffer overflow issues were found in various places, which could potentially crash programs using the library. CVE-2023-2977 A buffer overrun vulnerability was found in pkcs15's cardos_have_verifyrc_package(). When supplying a smart card package with malformed ASN.1 context, an attacker can trigger a crash or information leak via heap-based buffer out-of-bound read. CVE-2023-5992 Alicja Karion discovered that the code handling the PKCS#1.5 encryption padding removal was not implemented in side-channel resistant way, which can lead to decryption of previously captured RSA ciphertexts and forging of signatures based on the timing data (Marvin attack). CVE-2023-40660 Deepanjan Pal discovered a potential PIN bypass with empty PIN. When the token/card was plugged into the computer and authenticated from one process, it could be used to provide cryptographic operations from different process when the empty, zero-length PIN was provided. CVE-2023-40661 Multiple memory vulnerabilities were found by dynamic analyzers in pkcs15-init. CVE-2024-1454 A memory use after free issue was found in AuthentIC driver when updating token info. CVE-2024-8443 An heap buffer overflow issue was found in OpenPGP driver during key generation. CVE-2024-45615 Matteo Marini discovered multiple uses of uninitialized values in libopensc and pkcs15init. CVE-2024-45616 Matteo Marini discovered multiple uses of uninitialized values after incorrect check or usage of APDU response values in libopensc. CVE-2024-45617 Matteo Marini discovered multiple uses of uninitialized values after incorrect or missing checking return values of functions in libopensc. CVE-2024-45618 Matteo Marini discovered multiple uses of uninitialized values after incorrect or missing checking return values of functions in pkcs15init. CVE-2024-45619 Matteo Marini discovered multiple incorrect handling of length of buffers or files in libopensc, which could result in application crash or information leak. When buffers are partially filled with data, uninitialized parts of the buffer may be incorrectly accessed. CVE-2024-45620 Matteo Marini discovered multiple incorrect handling of length of buffers or files in pkcs15init, which could result in application crash or information leak. When buffers are partially filled with data, uninitialized parts of the buffer may be incorrectly accessed. For Debian 11 bullseye, these problems have been fixed in version 0.21.0-1+deb11u1. We recommend that you upgrade your opensc packages. For the detailed security status of opensc please refer to its security tracker page at: https://security-tracker.debian.org/tracker/opensc Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature