SUSE Security Update: Security update for opensc
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3622-1
Rating:             moderate
References:         #1104812 #1106998 #1106999 #1107033 #1107034 
                    #1107037 #1107038 #1107039 #1107097 #1107107 
                    #1108318 
Cross-References:   CVE-2018-16391 CVE-2018-16392 CVE-2018-16393
                    CVE-2018-16418 CVE-2018-16419 CVE-2018-16420
                    CVE-2018-16422 CVE-2018-16423 CVE-2018-16426
                    CVE-2018-16427
Affected Products:
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

   An update that solves 10 vulnerabilities and has one errata
   is now available.

Description:

   This update for opensc fixes the following issues:

   - CVE-2018-16391: Fixed a denial of service when handling responses from a
     Muscle Card (bsc#1106998)
   - CVE-2018-16392: Fixed a denial of service when handling responses from a
     TCOS Card (bsc#1106999)
   - CVE-2018-16393: Fixed buffer overflows when handling responses from
     Gemsafe V1 Smartcards (bsc#1108318)
   - CVE-2018-16418: Fixed buffer overflow when handling string concatenation
     in util_acl_to_str (bsc#1107039)
   - CVE-2018-16419: Fixed several buffer overflows when handling responses
     from a Cryptoflex card (bsc#1107107)
   - CVE-2018-16420: Fixed buffer overflows when handling responses from an
     ePass 2003 Card (bsc#1107097)
   - CVE-2018-16422: Fixed single byte buffer overflow when handling
     responses from an esteid Card (bsc#1107038)
   - CVE-2018-16423: Fixed double free when handling responses from a
     smartcard (bsc#1107037)
   - CVE-2018-16426: Fixed endless recursion when handling responses from an
     IAS-ECC card (bsc#1107034)
   - CVE-2018-16427: Fixed out of bounds reads when handling responses in
     OpenSC (bsc#1107033)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2582=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2582=1



Package List:

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      opensc-0.13.0-3.3.2
      opensc-debuginfo-0.13.0-3.3.2
      opensc-debugsource-0.13.0-3.3.2

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      opensc-0.13.0-3.3.2
      opensc-debuginfo-0.13.0-3.3.2
      opensc-debugsource-0.13.0-3.3.2


References:

   https://www.suse.com/security/cve/CVE-2018-16391.html
   https://www.suse.com/security/cve/CVE-2018-16392.html
   https://www.suse.com/security/cve/CVE-2018-16393.html
   https://www.suse.com/security/cve/CVE-2018-16418.html
   https://www.suse.com/security/cve/CVE-2018-16419.html
   https://www.suse.com/security/cve/CVE-2018-16420.html
   https://www.suse.com/security/cve/CVE-2018-16422.html
   https://www.suse.com/security/cve/CVE-2018-16423.html
   https://www.suse.com/security/cve/CVE-2018-16426.html
   https://www.suse.com/security/cve/CVE-2018-16427.html
   https://bugzilla.suse.com/1104812
   https://bugzilla.suse.com/1106998
   https://bugzilla.suse.com/1106999
   https://bugzilla.suse.com/1107033
   https://bugzilla.suse.com/1107034
   https://bugzilla.suse.com/1107037
   https://bugzilla.suse.com/1107038
   https://bugzilla.suse.com/1107039
   https://bugzilla.suse.com/1107097
   https://bugzilla.suse.com/1107107
   https://bugzilla.suse.com/1108318

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2018:3622-1 moderate: opensc

November 5, 2018
An update that solves 10 vulnerabilities and has one errata is now available

Summary

This update for opensc fixes the following issues: - CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998) - CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999) - CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318) - CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039) - CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107) - CVE-2018-16420: Fixed buffer overflows when handling responses from an ePass 2003 Card (bsc#1107097) - CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038) - CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037) - CVE-2018-16426: Fixed endless recursion when handling responses from an IAS-ECC card (bsc#1107034) - CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2582=1 - SUSE Linux Enterprise Desktop 12-SP3: zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2582=1 Package List: - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64): opensc-0.13.0-3.3.2 opensc-debuginfo-0.13.0-3.3.2 opensc-debugsource-0.13.0-3.3.2 - SUSE Linux Enterprise Desktop 12-SP3 (x86_64): opensc-0.13.0-3.3.2 opensc-debuginfo-0.13.0-3.3.2 opensc-debugsource-0.13.0-3.3.2

References

#1104812 #1106998 #1106999 #1107033 #1107034

#1107037 #1107038 #1107039 #1107097 #1107107

#1108318

Cross- CVE-2018-16391 CVE-2018-16392 CVE-2018-16393

CVE-2018-16418 CVE-2018-16419 CVE-2018-16420

CVE-2018-16422 CVE-2018-16423 CVE-2018-16426

CVE-2018-16427

Affected Products:

SUSE Linux Enterprise Server 12-SP3

SUSE Linux Enterprise Desktop 12-SP3

https://www.suse.com/security/cve/CVE-2018-16391.html

https://www.suse.com/security/cve/CVE-2018-16392.html

https://www.suse.com/security/cve/CVE-2018-16393.html

https://www.suse.com/security/cve/CVE-2018-16418.html

https://www.suse.com/security/cve/CVE-2018-16419.html

https://www.suse.com/security/cve/CVE-2018-16420.html

https://www.suse.com/security/cve/CVE-2018-16422.html

https://www.suse.com/security/cve/CVE-2018-16423.html

https://www.suse.com/security/cve/CVE-2018-16426.html

https://www.suse.com/security/cve/CVE-2018-16427.html

https://bugzilla.suse.com/1104812

https://bugzilla.suse.com/1106998

https://bugzilla.suse.com/1106999

https://bugzilla.suse.com/1107033

https://bugzilla.suse.com/1107034

https://bugzilla.suse.com/1107037

https://bugzilla.suse.com/1107038

https://bugzilla.suse.com/1107039

https://bugzilla.suse.com/1107097

https://bugzilla.suse.com/1107107

https://bugzilla.suse.com/1108318

Severity
Announcement ID: SUSE-SU-2018:3622-1
Rating: moderate

Related News