You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa opensc

Sigurnosni nedostaci programskog paketa opensc

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for opensc
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:3716-1
Rating: moderate
References: #1104812 #1106998 #1106999 #1107033 #1107034
#1107035 #1107036 #1107037 #1107038 #1107039
#1107049 #1107097 #1107107 #1108318
Cross-References: CVE-2018-16391 CVE-2018-16392 CVE-2018-16393
CVE-2018-16418 CVE-2018-16419 CVE-2018-16420
CVE-2018-16421 CVE-2018-16422 CVE-2018-16423
CVE-2018-16424 CVE-2018-16425 CVE-2018-16426
CVE-2018-16427
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves 13 vulnerabilities and has one errata
is now available.

Description:

This update for opensc fixes the following security issues:

– CVE-2018-16391: Fixed a denial of service when handling responses from a
Muscle Card (bsc#1106998)
– CVE-2018-16392: Fixed a denial of service when handling responses from a
TCOS Card (bsc#1106999)
– CVE-2018-16393: Fixed buffer overflows when handling responses from
Gemsafe V1 Smartcards (bsc#1108318)
– CVE-2018-16418: Fixed buffer overflow when handling string concatenation
in util_acl_to_str (bsc#1107039)
– CVE-2018-16419: Fixed several buffer overflows when handling responses
from a Cryptoflex card (bsc#1107107)
– CVE-2018-16420: Fixed buffer overflows when handling responses from an
ePass 2003 Card (bsc#1107097)
– CVE-2018-16421: Fixed buffer overflows when handling responses from a
CAC Card (bsc#1107049)
– CVE-2018-16422: Fixed single byte buffer overflow when handling
responses from an esteid Card (bsc#1107038)
– CVE-2018-16423: Fixed double free when handling responses from a
smartcard (bsc#1107037)
– CVE-2018-16424: Fixed double free when handling responses in read_file
(bsc#1107036)
– CVE-2018-16425: Fixed double free when handling responses from an HSM
Card (bsc#1107035)
– CVE-2018-16426: Fixed endless recursion when handling responses from an
IAS-ECC card (bsc#1107034)
– CVE-2018-16427: Fixed out of bounds reads when handling responses in
OpenSC (bsc#1107033)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1385=1

Package List:

– openSUSE Leap 15.0 (i586 x86_64):

opensc-0.18.0-lp150.2.9.1
opensc-debuginfo-0.18.0-lp150.2.9.1
opensc-debugsource-0.18.0-lp150.2.9.1

– openSUSE Leap 15.0 (x86_64):

opensc-32bit-0.18.0-lp150.2.9.1
opensc-32bit-debuginfo-0.18.0-lp150.2.9.1

References:

https://www.suse.com/security/cve/CVE-2018-16391.html
https://www.suse.com/security/cve/CVE-2018-16392.html
https://www.suse.com/security/cve/CVE-2018-16393.html
https://www.suse.com/security/cve/CVE-2018-16418.html
https://www.suse.com/security/cve/CVE-2018-16419.html
https://www.suse.com/security/cve/CVE-2018-16420.html
https://www.suse.com/security/cve/CVE-2018-16421.html
https://www.suse.com/security/cve/CVE-2018-16422.html
https://www.suse.com/security/cve/CVE-2018-16423.html
https://www.suse.com/security/cve/CVE-2018-16424.html
https://www.suse.com/security/cve/CVE-2018-16425.html
https://www.suse.com/security/cve/CVE-2018-16426.html
https://www.suse.com/security/cve/CVE-2018-16427.html
https://bugzilla.suse.com/1104812
https://bugzilla.suse.com/1106998
https://bugzilla.suse.com/1106999
https://bugzilla.suse.com/1107033
https://bugzilla.suse.com/1107034
https://bugzilla.suse.com/1107035
https://bugzilla.suse.com/1107036
https://bugzilla.suse.com/1107037
https://bugzilla.suse.com/1107038
https://bugzilla.suse.com/1107039
https://bugzilla.suse.com/1107049
https://bugzilla.suse.com/1107097
https://bugzilla.suse.com/1107107
https://bugzilla.suse.com/1108318


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for opensc
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:3701-1
Rating: moderate
References: #1104812 #1106998 #1106999 #1107033 #1107034
#1107037 #1107038 #1107039 #1107097 #1107107
#1108318
Cross-References: CVE-2018-16391 CVE-2018-16392 CVE-2018-16393
CVE-2018-16418 CVE-2018-16419 CVE-2018-16420
CVE-2018-16422 CVE-2018-16423 CVE-2018-16426
CVE-2018-16427
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves 10 vulnerabilities and has one errata
is now available.

Description:

This update for opensc fixes the following issues:

– CVE-2018-16391: Fixed a denial of service when handling responses from a
Muscle Card (bsc#1106998)
– CVE-2018-16392: Fixed a denial of service when handling responses from a
TCOS Card (bsc#1106999)
– CVE-2018-16393: Fixed buffer overflows when handling responses from
Gemsafe V1 Smartcards (bsc#1108318)
– CVE-2018-16418: Fixed buffer overflow when handling string concatenation
in util_acl_to_str (bsc#1107039)
– CVE-2018-16419: Fixed several buffer overflows when handling responses
from a Cryptoflex card (bsc#1107107)
– CVE-2018-16420: Fixed buffer overflows when handling responses from an
ePass 2003 Card (bsc#1107097)
– CVE-2018-16422: Fixed single byte buffer overflow when handling
responses from an esteid Card (bsc#1107038)
– CVE-2018-16423: Fixed double free when handling responses from a
smartcard (bsc#1107037)
– CVE-2018-16426: Fixed endless recursion when handling responses from an
IAS-ECC card (bsc#1107034)
– CVE-2018-16427: Fixed out of bounds reads when handling responses in
OpenSC (bsc#1107033)

This update was imported from the SUSE:SLE-12:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1384=1

Package List:

– openSUSE Leap 42.3 (i586 x86_64):

opensc-0.13.0-9.3.1
opensc-debuginfo-0.13.0-9.3.1
opensc-debugsource-0.13.0-9.3.1

References:

https://www.suse.com/security/cve/CVE-2018-16391.html
https://www.suse.com/security/cve/CVE-2018-16392.html
https://www.suse.com/security/cve/CVE-2018-16393.html
https://www.suse.com/security/cve/CVE-2018-16418.html
https://www.suse.com/security/cve/CVE-2018-16419.html
https://www.suse.com/security/cve/CVE-2018-16420.html
https://www.suse.com/security/cve/CVE-2018-16422.html
https://www.suse.com/security/cve/CVE-2018-16423.html
https://www.suse.com/security/cve/CVE-2018-16426.html
https://www.suse.com/security/cve/CVE-2018-16427.html
https://bugzilla.suse.com/1104812
https://bugzilla.suse.com/1106998
https://bugzilla.suse.com/1106999
https://bugzilla.suse.com/1107033
https://bugzilla.suse.com/1107034
https://bugzilla.suse.com/1107037
https://bugzilla.suse.com/1107038
https://bugzilla.suse.com/1107039
https://bugzilla.suse.com/1107097
https://bugzilla.suse.com/1107107
https://bugzilla.suse.com/1108318


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorJosip Papratovic
Cert idNCERT-REF-2018-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa curl

Otkriveni su sigurnosni nedostaci u programskom paketu curl za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja,...

Close