Security update for yubico-piv-tool
Announcement ID: | SUSE-SU-2019:1123-1 |
---|---|
Rating: | low |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities can now be installed.
Description:
This update for yubico-piv-tool fixes the following issues:
Security issues fixed:
- Fixed an buffer overflow and an out of bounds memory read in ykpiv_transfer_data(), which could be triggered by a malicious token. (CVE-2018-14779, bsc#1104809, YSA-2018-03)
- Fixed an buffer overflow and an out of bounds memory read in _ykpiv_fetch_object(), which could be triggered by a malicious token. (CVE-2018-14780, bsc#1104811, YSA-2018-03)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15
zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-1123=1
Package List:
-
Basesystem Module 15 (aarch64 ppc64le s390x x86_64)
- libykpiv1-1.5.0-3.3.33
- yubico-piv-tool-debugsource-1.5.0-3.3.33
- libykpiv1-debuginfo-1.5.0-3.3.33
- yubico-piv-tool-1.5.0-3.3.33
- yubico-piv-tool-debuginfo-1.5.0-3.3.33
- libykcs11-1-debuginfo-1.5.0-3.3.33
- libykcs11-devel-1.5.0-3.3.33
- libykpiv-devel-1.5.0-3.3.33
- libykcs11-1-1.5.0-3.3.33