Security update for opensc
Announcement ID: | SUSE-SU-2018:3629-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 13 vulnerabilities and has one security fix can now be installed.
Description:
This update for opensc fixes the following security issues:
- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16420: Fixed buffer overflows when handling responses from an ePass 2003 Card (bsc#1107097)
- CVE-2018-16421: Fixed buffer overflows when handling responses from a CAC Card (bsc#1107049)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16424: Fixed double free when handling responses in read_file (bsc#1107036)
- CVE-2018-16425: Fixed double free when handling responses from an HSM Card (bsc#1107035)
- CVE-2018-16426: Fixed endless recursion when handling responses from an IAS-ECC card (bsc#1107034)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15
zypper in -t patch SUSE-SLE-Module-Basesystem-15-2018-2581=1
Package List:
-
Basesystem Module 15 (aarch64 ppc64le s390x x86_64)
- opensc-debugsource-0.18.0-3.8.1
- opensc-debuginfo-0.18.0-3.8.1
- opensc-0.18.0-3.8.1
References:
- https://www.suse.com/security/cve/CVE-2018-16391.html
- https://www.suse.com/security/cve/CVE-2018-16392.html
- https://www.suse.com/security/cve/CVE-2018-16393.html
- https://www.suse.com/security/cve/CVE-2018-16418.html
- https://www.suse.com/security/cve/CVE-2018-16419.html
- https://www.suse.com/security/cve/CVE-2018-16420.html
- https://www.suse.com/security/cve/CVE-2018-16421.html
- https://www.suse.com/security/cve/CVE-2018-16422.html
- https://www.suse.com/security/cve/CVE-2018-16423.html
- https://www.suse.com/security/cve/CVE-2018-16424.html
- https://www.suse.com/security/cve/CVE-2018-16425.html
- https://www.suse.com/security/cve/CVE-2018-16426.html
- https://www.suse.com/security/cve/CVE-2018-16427.html
- https://bugzilla.suse.com/show_bug.cgi?id=1104812
- https://bugzilla.suse.com/show_bug.cgi?id=1106998
- https://bugzilla.suse.com/show_bug.cgi?id=1106999
- https://bugzilla.suse.com/show_bug.cgi?id=1107033
- https://bugzilla.suse.com/show_bug.cgi?id=1107034
- https://bugzilla.suse.com/show_bug.cgi?id=1107035
- https://bugzilla.suse.com/show_bug.cgi?id=1107036
- https://bugzilla.suse.com/show_bug.cgi?id=1107037
- https://bugzilla.suse.com/show_bug.cgi?id=1107038
- https://bugzilla.suse.com/show_bug.cgi?id=1107039
- https://bugzilla.suse.com/show_bug.cgi?id=1107049
- https://bugzilla.suse.com/show_bug.cgi?id=1107097
- https://bugzilla.suse.com/show_bug.cgi?id=1107107
- https://bugzilla.suse.com/show_bug.cgi?id=1108318