(AUSCERT#2009d1c06) Re: [SECURITY] [DSA 1734-1] New opensc packages fix information disclosure
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160
Hi Thijs,
We don't currently have your signature on file. Could you please send it to us?
Regards,
- -- Jonathan Levine --
Information Security Analyst | Hotline: +61 7 3365 4417
AusCERT, Australia's National CERT | Fax: +61 7 3365 7031
The University of Queensland | WWW: www.auscert.org.au
QLD 4072 Australia | Email: auscert@auscert.org.au
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - ------------------------------------------------------------------------
> Debian Security Advisory DSA-1734-1 security@debian.org
> http://www.debian.org/security/ Thijs Kinkhorst
> March 05, 2009 http://www.debian.org/security/faq
> - ------------------------------------------------------------------------
>
> Package : opensc
> Vulnerability : programming error
> Problem type : local
> Debian-specific: no
> CVE Id(s) : CVE-2009-0368
>
> b.badrignans discovered that OpenSC, a set of smart card utilities,
> could stores private data on a smart card without proper access
> restrictions.
>
> Only blank cards initialised with OpenSC are affected by this problem.
> This update only improves creating new private data objects, but cards
> already initialised with such private data objects need to be
> modified to repair the access control conditions on such cards.
> Instructions for a variety of situations can be found at the OpenSC
> web site: http://www.opensc-project.org/security.html
>
> The oldstable distribution (etch) is not affected by this problem.
>
> For the stable distribution (lenny), this problem has been fixed in
> version 0.11.4-5+lenny1.
>
> For the unstable distribution (sid), this problem wil be fixed soon.
>
> We recommend that you upgrade your opensc package and recreate any
> private data objects stored on your smart cards.
>
> Upgrade instructions
> - --------------------
>
> wget url
> will fetch the file for you
> dpkg -i file.deb
> will install the referenced file.
>
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
>
> apt-get update
> will update the internal database
> apt-get upgrade
> will install corrected packages
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
>
>
> Debian GNU/Linux 5.0 alias lenny
> - --------------------------------
>
> Source archives:
>
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1.dsc
> Size/MD5 checksum: 1333 a6a3c786d70bba230912db8550321b74
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1.dif
f.gz
> Size/MD5 checksum: 59733 5c19aa261ca11caeb9b46defe3a31754
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4.orig.tar.gz
> Size/MD5 checksum: 1410650 2031aa617be609d50d014d5d370bb8a2
>
> alpha architecture (DEC Alpha)
>
>
http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le
nny1_alpha.deb
> Size/MD5 checksum: 172210 4c13e02bdae7b31e03c07c77114ba7c5
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le
nny1_alpha.deb
> Size/MD5 checksum: 1425142 7de474eeba7f7c4d7c4ea720ce35a113
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1
_alpha.deb
> Size/MD5 checksum: 617062 71bb9f5faf9dec5fb628f60d72a1f32c
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_alp
ha.deb
> Size/MD5 checksum: 395886 5f611a12bb340abcecd753ce9a0a9f7d
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le
nny1_alpha.deb
> Size/MD5 checksum: 1244884 e4fd99a2cdd5822eeb3c27200bdeabf4
>
> amd64 architecture (AMD x86_64 (AMD64))
>
>
http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le
nny1_amd64.deb
> Size/MD5 checksum: 170424 797bf32516f3c8bf2784a40b3ea4b69b
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1
_amd64.deb
> Size/MD5 checksum: 600140 b426f75de39097f951edbb6beb267faf
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le
nny1_amd64.deb
> Size/MD5 checksum: 1220570 9fac7d931102a13759ff27ca3e63886f
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le
nny1_amd64.deb
> Size/MD5 checksum: 1250976 348819662c1e6d0f856468f57f963bef
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_amd
64.deb
> Size/MD5 checksum: 385876 e82572802a8f5297d4b231510d66a703
>
> arm architecture (ARM)
>
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1
_arm.deb
> Size/MD5 checksum: 553454 d2f2216d33649da2dedd0695f15df2bf
>
http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le
nny1_arm.deb
> Size/MD5 checksum: 164808 0a97588a633ef6fd02a7d8b7c42f75c9
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le
nny1_arm.deb
> Size/MD5 checksum: 1192088 36f02f0adf21ff6681cb0fc82ed70bd0
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_arm
.deb
> Size/MD5 checksum: 373220 4d994a576b5727bdd255977d0618ad4f
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le
nny1_arm.deb
> Size/MD5 checksum: 1082568 27a17ba27333f92ec57c4610c9332eb2
>
> armel architecture (ARM EABI)
>
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le
nny1_armel.deb
> Size/MD5 checksum: 1194564 4be8b8833593141ec3e001165687a157
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_arm
el.deb
> Size/MD5 checksum: 369484 b8de7da5f2f0b6d54db89f9e3a19d160
>
http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le
nny1_armel.deb
> Size/MD5 checksum: 165046 9653c45b02a720ccdbb34856fd3a76b1
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1
_armel.deb
> Size/MD5 checksum: 554712 b2773b917fa2e0bc309fd458c0fea985
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le
nny1_armel.deb
> Size/MD5 checksum: 1090686 475492b51137ee7a91601c179b077bf4
>
> i386 architecture (Intel ia32)
>
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le
nny1_i386.deb
> Size/MD5 checksum: 1088224 11cb33b66522a8f90a4dffbb1c759cbe
>
http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le
nny1_i386.deb
> Size/MD5 checksum: 168202 46bb9b184aee6a8b8a8b585339baf872
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_i38
6.deb
> Size/MD5 checksum: 370748 1b61f2a6158c92d54209de0846604ed2
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le
nny1_i386.deb
> Size/MD5 checksum: 1193874 8901246b5fd2aefd2160fd173090f19b
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1
_i386.deb
> Size/MD5 checksum: 552886 46c25a7402174e76930ffeb6f398f040
>
> ia64 architecture (Intel ia64)
>
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_ia6
4.deb
> Size/MD5 checksum: 450212 553319b58affb12649c97fd1d37e8f8e
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le
nny1_ia64.deb
> Size/MD5 checksum: 1191394 17eb91686da2e1981c2915a6bd5bc584
>
http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le
nny1_ia64.deb
> Size/MD5 checksum: 181174 837b37ae471abef686d1e4bbcae8e23d
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1
_ia64.deb
> Size/MD5 checksum: 764982 0da3fd6cbf96bd50c4be097b7db65648
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le
nny1_ia64.deb
> Size/MD5 checksum: 1468110 ad9ce50c292f3e7ece834e698906044c
>
> mips architecture (MIPS (Big Endian))
>
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1
_mips.deb
> Size/MD5 checksum: 552488 ec12157337de83c661021aee7125db85
>
http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le
nny1_mips.deb
> Size/MD5 checksum: 166188 1eb9628b793ef050d1236cc9e4d4d532
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le
nny1_mips.deb
> Size/MD5 checksum: 1264080 684081bb05cb738cdf3e4b70b050565a
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_mip
s.deb
> Size/MD5 checksum: 377328 4968819d61a98db60aeb9bd5f07f49b1
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le
nny1_mips.deb
> Size/MD5 checksum: 1254718 156a199d51fe78218b4538449b1d3900
>
> mipsel architecture (MIPS (Little Endian))
>
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1
_mipsel.deb
> Size/MD5 checksum: 550368 3aa883498240d28dc669804f28fe80a9
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_mip
sel.deb
> Size/MD5 checksum: 377668 cb0740488998e4f703c015260f209f85
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le
nny1_mipsel.deb
> Size/MD5 checksum: 1235814 c61ddb25efc7625fece5c1f726ad5ed6
>
http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le
nny1_mipsel.deb
> Size/MD5 checksum: 166032 f673d0d05f0acc00ef26ddab2b3ae018
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le
nny1_mipsel.deb
> Size/MD5 checksum: 1247014 01e37c41e5aff2e4e41a5a76cab2d746
>
> powerpc architecture (PowerPC)
>
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le
nny1_powerpc.deb
> Size/MD5 checksum: 1281994 f6ff6e01ea9a89ff80dfa3988972a716
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le
nny1_powerpc.deb
> Size/MD5 checksum: 1253656 53557381f96bfce43e16d4652e9d445b
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_pow
erpc.deb
> Size/MD5 checksum: 408656 d56d8d461f12cd491d373262eb1e6c07
>
http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le
nny1_powerpc.deb
> Size/MD5 checksum: 171890 b5407ebd8e0b7b834ced0d23dc9060e8
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1
_powerpc.deb
> Size/MD5 checksum: 597100 c73b0856c446c730cb4b7a7f9c51b3eb
>
> s390 architecture (IBM S/390)
>
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1
_s390.deb
> Size/MD5 checksum: 594044 061ccf2f3690bae30a1493a9b1b54fcf
>
http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le
nny1_s390.deb
> Size/MD5 checksum: 171064 de877a46c93397604a33439eeb4da6c1
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le
nny1_s390.deb
> Size/MD5 checksum: 1242074 42f645018b540f551573815813e2b014
>
http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le
nny1_s390.deb
> Size/MD5 checksum: 1288032 57133c53afe7b50f517577fb3223ec80
>
http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_s39
0.deb
> Size/MD5 checksum: 382574 7939fd08de0421d15f5c7a20ff935576
>
>
> These files will probably be moved into the stable distribution on
> its next update.
>
> -
- --------------------------------------------------------------------------------
- -
> For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
> Mailing list: debian-security-announce@lists.debian.org
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (GNU/Linux)
>
> iQEcBAEBAgAGBQJJr4dhAAoJECIIoQCMVaAct04IAJMwLwCUCYzF97ERvt62ZP+d
> qBo9P8ELC9alOoMSUA/KHNu0fE+Q4/wcejYUc647T6rdIIj20yoGXhhvhHlx5g8F
> TYaDPHQN26JglEgsFfSN/BoAMFNQgHzzq/gsKfGLpqxMahESNLjiF/DfGftqgCD2
> ky4HGfFKCF+d7hH5+7R5WiEZ/6IFCZH89T8VCY1in9LvylbbWXhNpizpR33oHArk
> ru9lYQp0l8KnifonxUNVXSMr5LwJXEl4mQ0+N7QUT5fHqcmOOcS7sAdmE6w8bzaW
> VdBVh8XKFXsuvCZjp32cGdB1bHvUosd5Pf4F3cjMOB/P1EaSZkZK4F03ryTz5+Q=
> =fIxQ
> -----END PGP SIGNATURE-----
>
>
> --
> To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
>
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFJsGaoNVH5XJJInbgRA3btAJ4gqnAyrp9yooJ/kLxpMkc9FquLCQCfR9zb
TzKC+/LZ2V4bCjysnyb8wQk=
=Gi2o
-----END PGP SIGNATURE-----
Reply to: