--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2018-fe4b72fa7d
2018-10-05 16:00:25.667519
--------------------------------------------------------------------------------Name        : opensc
Product     : Fedora 29
Version     : 0.19.0
Release     : 1.fc29
URL         : https://github.com/OpenSC/OpenSC/wiki
Summary     : Smart card library and applications
Description :
OpenSC provides a set of libraries and utilities to work with smart cards. Its
main focus is on cards that support cryptographic operations, and facilitate
their use in security applications such as authentication, mail encryption and
digital signatures. OpenSC implements the PKCS#11 API so applications
supporting this API (such as Mozilla Firefox and Thunderbird) can use it. On
the card OpenSC implements the PKCS#15 standard and aims to be compatible with
every software/card that does so, too.

--------------------------------------------------------------------------------Update Information:

Security fix for CVE-2018-16418, CVE-2018-16419, CVE-2018-16420, CVE-2018-16421,
CVE-2018-16423, CVE-2018-16424, CVE-2018-16425, CVE-2018-16426, CVE-2018-16427 +
support for RSA-PSS signatures.
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1627998 - CVE-2018-16391 opensc: Buffer overflows handling responses from Muscle Cards in card-muscle.c:muscle_list_files()
        https://bugzilla.redhat.com/show_bug.cgi?id=1627998
  [ 2 ] Bug #1628002 - CVE-2018-16392 opensc: Buffer overflows handling responses from TCOS Cards in card-tcos.c:tcos_select_file()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628002
  [ 3 ] Bug #1628006 - CVE-2018-16393 opensc: Buffer overflows handling responses from Gemsafe V1 Smartcards in pkcs15-gemsafeV1.c:gemsafe_get_cert_len()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628006
  [ 4 ] Bug #1628010 - CVE-2018-16418 opensc: Buffer overflow handling string concatention in tools/util.c:util_acl_to_str()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628010
  [ 5 ] Bug #1628013 - CVE-2018-16419 opensc: Buffer overflow handling responses from Cryptoflex cards in in cryptoflex-tool.c:read_public_key()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628013
  [ 6 ] Bug #1628016 - CVE-2018-16422 opensc: Buffer overflow handling responses from esteid cards in pkcs15-esteid.c:sc_pkcs15emu_esteid_init()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628016
  [ 7 ] Bug #1628020 - CVE-2018-16423 opensc: Double free handling responses from smartcards in libopensc/sc.c:sc_file_set_sec_attr()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628020
  [ 8 ] Bug #1628023 - CVE-2018-16425 opensc: Double free handling responses from HSM Cards in pkcs15-sc-hsm.c:sc_pkcs15emu_sc_hsm_init()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628023
  [ 9 ] Bug #1628026 - CVE-2018-16420 opensc: Buffer overflows handling responses from ePass 2003 Cards in card-epass2003.c:decrypt_response()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628026
  [ 10 ] Bug #1628034 - CVE-2018-16421 opensc: Buffer overflows handling responses from CAC Cards in card-cac.c:cac_get_serial_nr_from_CUID()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628034
  [ 11 ] Bug #1628040 - CVE-2018-16424 opensc: Double free handling responses from smartcards in tools/egk-tool.c:read_file()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628040
  [ 12 ] Bug #1628044 - CVE-2018-16426 opensc: Infinite recusrion handling responses from IAS-ECC cards in card-iasecc.c:iasecc_select_file()
        https://bugzilla.redhat.com/show_bug.cgi?id=1628044
  [ 13 ] Bug #1628052 - CVE-2018-16427 opensc: Out of bounds reads handling responses from smartcards
        https://bugzilla.redhat.com/show_bug.cgi?id=1628052
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-fe4b72fa7d' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Fedora 29: opensc Security Update

October 5, 2018
Security fix for CVE-2018-16418, CVE-2018-16419, CVE-2018-16420, CVE-2018-16421, CVE-2018-16423, CVE-2018-16424, CVE-2018-16425, CVE-2018-16426, CVE-2018-16427 + support for RSA-PS...

Summary

OpenSC provides a set of libraries and utilities to work with smart cards. Its

main focus is on cards that support cryptographic operations, and facilitate

their use in security applications such as authentication, mail encryption and

digital signatures. OpenSC implements the PKCS#11 API so applications

supporting this API (such as Mozilla Firefox and Thunderbird) can use it. On

the card OpenSC implements the PKCS#15 standard and aims to be compatible with

every software/card that does so, too.

Security fix for CVE-2018-16418, CVE-2018-16419, CVE-2018-16420, CVE-2018-16421,

CVE-2018-16423, CVE-2018-16424, CVE-2018-16425, CVE-2018-16426, CVE-2018-16427 +

support for RSA-PSS signatures.

[ 1 ] Bug #1627998 - CVE-2018-16391 opensc: Buffer overflows handling responses from Muscle Cards in card-muscle.c:muscle_list_files()

https://bugzilla.redhat.com/show_bug.cgi?id=1627998

[ 2 ] Bug #1628002 - CVE-2018-16392 opensc: Buffer overflows handling responses from TCOS Cards in card-tcos.c:tcos_select_file()

https://bugzilla.redhat.com/show_bug.cgi?id=1628002

[ 3 ] Bug #1628006 - CVE-2018-16393 opensc: Buffer overflows handling responses from Gemsafe V1 Smartcards in pkcs15-gemsafeV1.c:gemsafe_get_cert_len()

https://bugzilla.redhat.com/show_bug.cgi?id=1628006

[ 4 ] Bug #1628010 - CVE-2018-16418 opensc: Buffer overflow handling string concatention in tools/util.c:util_acl_to_str()

https://bugzilla.redhat.com/show_bug.cgi?id=1628010

[ 5 ] Bug #1628013 - CVE-2018-16419 opensc: Buffer overflow handling responses from Cryptoflex cards in in cryptoflex-tool.c:read_public_key()

https://bugzilla.redhat.com/show_bug.cgi?id=1628013

[ 6 ] Bug #1628016 - CVE-2018-16422 opensc: Buffer overflow handling responses from esteid cards in pkcs15-esteid.c:sc_pkcs15emu_esteid_init()

https://bugzilla.redhat.com/show_bug.cgi?id=1628016

[ 7 ] Bug #1628020 - CVE-2018-16423 opensc: Double free handling responses from smartcards in libopensc/sc.c:sc_file_set_sec_attr()

https://bugzilla.redhat.com/show_bug.cgi?id=1628020

[ 8 ] Bug #1628023 - CVE-2018-16425 opensc: Double free handling responses from HSM Cards in pkcs15-sc-hsm.c:sc_pkcs15emu_sc_hsm_init()

https://bugzilla.redhat.com/show_bug.cgi?id=1628023

[ 9 ] Bug #1628026 - CVE-2018-16420 opensc: Buffer overflows handling responses from ePass 2003 Cards in card-epass2003.c:decrypt_response()

https://bugzilla.redhat.com/show_bug.cgi?id=1628026

[ 10 ] Bug #1628034 - CVE-2018-16421 opensc: Buffer overflows handling responses from CAC Cards in card-cac.c:cac_get_serial_nr_from_CUID()

https://bugzilla.redhat.com/show_bug.cgi?id=1628034

[ 11 ] Bug #1628040 - CVE-2018-16424 opensc: Double free handling responses from smartcards in tools/egk-tool.c:read_file()

https://bugzilla.redhat.com/show_bug.cgi?id=1628040

[ 12 ] Bug #1628044 - CVE-2018-16426 opensc: Infinite recusrion handling responses from IAS-ECC cards in card-iasecc.c:iasecc_select_file()

https://bugzilla.redhat.com/show_bug.cgi?id=1628044

[ 13 ] Bug #1628052 - CVE-2018-16427 opensc: Out of bounds reads handling responses from smartcards

https://bugzilla.redhat.com/show_bug.cgi?id=1628052

su -c 'dnf upgrade --advisory FEDORA-2018-fe4b72fa7d' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

FEDORA-2018-fe4b72fa7d 2018-10-05 16:00:25.667519 Product : Fedora 29 Version : 0.19.0 Release : 1.fc29 URL : https://github.com/OpenSC/OpenSC/wiki Summary : Smart card library and applications Description : OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitate their use in security applications such as authentication, mail encryption and digital signatures. OpenSC implements the PKCS#11 API so applications supporting this API (such as Mozilla Firefox and Thunderbird) can use it. On the card OpenSC implements the PKCS#15 standard and aims to be compatible with every software/card that does so, too. Security fix for CVE-2018-16418, CVE-2018-16419, CVE-2018-16420, CVE-2018-16421, CVE-2018-16423, CVE-2018-16424, CVE-2018-16425, CVE-2018-16426, CVE-2018-16427 + support for RSA-PSS signatures. [ 1 ] Bug #1627998 - CVE-2018-16391 opensc: Buffer overflows handling responses from Muscle Cards in card-muscle.c:muscle_list_files() https://bugzilla.redhat.com/show_bug.cgi?id=1627998 [ 2 ] Bug #1628002 - CVE-2018-16392 opensc: Buffer overflows handling responses from TCOS Cards in card-tcos.c:tcos_select_file() https://bugzilla.redhat.com/show_bug.cgi?id=1628002 [ 3 ] Bug #1628006 - CVE-2018-16393 opensc: Buffer overflows handling responses from Gemsafe V1 Smartcards in pkcs15-gemsafeV1.c:gemsafe_get_cert_len() https://bugzilla.redhat.com/show_bug.cgi?id=1628006 [ 4 ] Bug #1628010 - CVE-2018-16418 opensc: Buffer overflow handling string concatention in tools/util.c:util_acl_to_str() https://bugzilla.redhat.com/show_bug.cgi?id=1628010 [ 5 ] Bug #1628013 - CVE-2018-16419 opensc: Buffer overflow handling responses from Cryptoflex cards in in cryptoflex-tool.c:read_public_key() https://bugzilla.redhat.com/show_bug.cgi?id=1628013 [ 6 ] Bug #1628016 - CVE-2018-16422 opensc: Buffer overflow handling responses from esteid cards in pkcs15-esteid.c:sc_pkcs15emu_esteid_init() https://bugzilla.redhat.com/show_bug.cgi?id=1628016 [ 7 ] Bug #1628020 - CVE-2018-16423 opensc: Double free handling responses from smartcards in libopensc/sc.c:sc_file_set_sec_attr() https://bugzilla.redhat.com/show_bug.cgi?id=1628020 [ 8 ] Bug #1628023 - CVE-2018-16425 opensc: Double free handling responses from HSM Cards in pkcs15-sc-hsm.c:sc_pkcs15emu_sc_hsm_init() https://bugzilla.redhat.com/show_bug.cgi?id=1628023 [ 9 ] Bug #1628026 - CVE-2018-16420 opensc: Buffer overflows handling responses from ePass 2003 Cards in card-epass2003.c:decrypt_response() https://bugzilla.redhat.com/show_bug.cgi?id=1628026 [ 10 ] Bug #1628034 - CVE-2018-16421 opensc: Buffer overflows handling responses from CAC Cards in card-cac.c:cac_get_serial_nr_from_CUID() https://bugzilla.redhat.com/show_bug.cgi?id=1628034 [ 11 ] Bug #1628040 - CVE-2018-16424 opensc: Double free handling responses from smartcards in tools/egk-tool.c:read_file() https://bugzilla.redhat.com/show_bug.cgi?id=1628040 [ 12 ] Bug #1628044 - CVE-2018-16426 opensc: Infinite recusrion handling responses from IAS-ECC cards in card-iasecc.c:iasecc_select_file() https://bugzilla.redhat.com/show_bug.cgi?id=1628044 [ 13 ] Bug #1628052 - CVE-2018-16427 opensc: Out of bounds reads handling responses from smartcards https://bugzilla.redhat.com/show_bug.cgi?id=1628052 su -c 'dnf upgrade --advisory FEDORA-2018-fe4b72fa7d' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Change Log

References

Update Instructions

Severity
Product : Fedora 29
Version : 0.19.0
Release : 1.fc29
URL : https://github.com/OpenSC/OpenSC/wiki
Summary : Smart card library and applications

Related News