Linux Security
    Linux Security
    Linux Security

    Mageia 2020-0026: opensc security update

    Date
    347
    Posted By
    Updated opensc packages fix security vulnerabilities: sc_context_create in ctx.c in libopensc in OpenSC 0.19.0 has a memory leak, as demonstrated by a call from eidenv (CVE-2019-6502).
    MGASA-2020-0026 - Updated opensc packages fix security vulnerability
    
    Publication date: 07 Jan 2020
    URL: https://advisories.mageia.org/MGASA-2020-0026.html
    Type: security
    Affected Mageia releases: 7
    CVE: CVE-2019-6502,
         CVE-2019-15945,
         CVE-2019-15946,
         CVE-2019-19479,
         CVE-2019-19480,
         CVE-2019-19481
    
    Updated opensc packages fix security vulnerabilities:
    
    sc_context_create in ctx.c in libopensc in OpenSC 0.19.0 has a memory
    leak, as demonstrated by a call from eidenv (CVE-2019-6502).
    
    OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Bitstring
    in decode_bit_string in libopensc/asn1.c (CVE-2019-15945).
    
    OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet
    string in asn1_decode_entry in libopensc/asn1.c (CVE-2019-15946).
    
    An issue was discovered in OpenSC through 0.19.0 and 0.20.x through
    0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during
    parsing of a SETCOS file attribute (CVE-2019-19479).
    
    An issue was discovered in OpenSC through 0.19.0 and 0.20.x through
    0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in
    sc_pkcs15_decode_prkdf_entry (CVE-2019-19480).
    
    An issue was discovered in OpenSC through 0.19.0 and 0.20.x through
    0.20.0-rc3. libopensc/card-cac1.c mishandles buffer limits for CAC
    certificates (CVE-2019-19481).
    
    The opensc package has been updated to version 0.20.0, which has fixes for
    these issues and other improvements.
    
    References:
    - https://bugs.mageia.org/show_bug.cgi?id=25975
    - https://github.com/OpenSC/OpenSC/releases/tag/0.20.0
    - https://www.openwall.com/lists/oss-security/2019/12/29/1
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6502
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15945
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15946
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19479
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19480
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19481
    
    SRPMS:
    - 7/core/opensc-0.20.0-1.mga7
    

    Advisories

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"2","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.