Debian Patches

Status for opensc/0.23.0-0.3+deb12u2

Patch Description Author Forwarded Bugs Origin Last update
CVE-2023-5992/14-7471dd2.patch minidriver: Refactor inversion of decrypted buffer Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/7471dd26cde84bf573c03af68b47c0b0dab5edfa 2024-03-21
0029-authentic-Avoid-memory-leaks.patch authentic: Avoid memory leaks
Thanks oss-fuzz
Jakub Jelen <jjelen@redhat.com> yes upstream https://github.com/OpenSC/OpenSC/commit/6d1fcd9cf82c6501089898066656fbe6737f3ced 2023-11-23
CVE-2024-1454.patch authentic: Avoid use after free
Thanks oss-fuzz
Jakub Jelen <jjelen@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9 2023-12-18
CVE-2024-45616/03-1d3b410.patch cardos: Fix uninitialized values
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/1d3b410e06d33cfc4c70e8a25386e456cfbd7bd1 2024-07-11
CVE-2023-5992/03-2ee8730.patch pkcs15-sec: Remove logging after PKCS#1 v1.5 depadding
To prevent Marvin attack on RSA PKCS#1 v1.5 padding
when logging the return value, signaling the padding error.
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/2ee8730649e9a0f2ab01597cfba4f72571eed601 2023-11-16
CVE-2024-45616/05-5fa7587.patch muscle: Report invalid SW when reading object
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/5fa758767e517779fc5398b6b4faedc4e36d3de5 2024-07-12
CVE-2024-45616/06-3562969.patch card-mcrd: Check length of response buffer in select
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/3562969c90a71b0bcce979f0e6d627546073a7fc 2024-07-12
CVE-2024-45615/03-bb3dedb.patch pkcs15-cert.c: Initialize OID length
In case it is not set later.

Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/bb3dedb71e59bd17f96fd4e807250a5cf2253cb7 2024-07-12
CVE-2024-45616/07-16ada9d.patch card-gids: Use actual length of reponse buffer
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/16ada9dc7cddf1cb99516aea67b6752c251c94a2 2024-07-12
CVE-2024-45616/04-cccdfc4.patch card-dnie: Check APDU response length and ASN1 lengths
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/cccdfc46b10184d1eea62d07fe2b06240b7fafbc 2024-07-12
0013-CVE-2023-40661.patch pkcs15-cflex: check path length to prevent underflow
Thanks OSS-Fuzz
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=58932
=?UTF-8?q?Veronika=20Hanul=C3=ADkov=C3=A1?= <vhanulik@redhat.com> no https://github.com/OpenSC/OpenSC/commit/c449a181a6988cc1e8dc8764d23574e48cdc3fa6 2023-06-19
0014-CVE-2023-40661.patch Check array bounds
Thanks OSS-Fuzz
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54312
Veronika Hanulikova <xhanulik@fi.muni.cz> no https://github.com/OpenSC/OpenSC/commit/df5a176bfdf8c52ba89c7fef1f82f6f3b9312bc1 2023-02-10
0015-CVE-2023-40661.patch Check length of string before making copy
Thanks OSS-Fuzz
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=55851
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=55998
Veronika Hanulikova <xhanulik@fi.muni.cz> no https://github.com/OpenSC/OpenSC/commit/5631e9843c832a99769def85b7b9b68b4e3e3959 2023-03-03
CVE-2023-5992/12-21a0a25.patch minidriver: Remove logging to prevent Marvin attack Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/21a0a25e516cc46724659efb1f08e778d1c225f5 2024-03-20
CVE-2023-5992/13-29a98e5.patch unittests: Test correct output length for PKCS#1 v1.5 depadding Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/29a98e5b2811f3df7cc7982d8b30a86e756c325c 2024-03-20
CVE-2023-5992/01-e8883b1.patch Reimplement removing of PKCS#1 v1.5 padding to be time constant Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/e8883b1f91572c40bab8718f0ba274ab71906490 2023-11-13
CVE-2023-5992/02-bfe0e05.patch Add unit tests for PKCS#1 v1.5 de-padding Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/bfe0e05f4aa771d6beab4660c06072eb6eedf372 2023-11-13
CVE-2023-5992/10-c153e2f.patch Fix constant-time comparison of negative values
Thanks Coverity CID 414687
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/c153e2fe979b05851ab06b45799a9358cdde6fe3 2024-02-05
CVE-2023-5992/11-556cbf3.patch padding: Set correct output length in PKCS#1 v1.5 depadding Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/556cbf3ef71425e69eb3914961332f67335cd9ff 2024-03-19
0001-Use-sysconfdir-opensc-for-opensc.conf.patch Use $sysconfdir/opensc for opensc.conf Eric Dorland <eric@debian.org> no 2020-01-26
0002-Fix-private-key-import.patch pkcs11-tool: Fix private key import Jakub Jelen <jjelen@redhat.com> no upstream, 9294183e07ff4944e3f5e590f343f5727636767e 2022-12-01
0003-Log-OpenSSL-errors.patch pkcs11-tool: Log more information on OpenSSL errors Jakub Jelen <jjelen@redhat.com> no upstream, cff91cf6167743bdd59285150c4ef19802ed2644 2022-12-01
0004-pkcs15init-correct-left-length-calculation.patch pkcs15init: correct left length calculation to fix buffer overrun bug. Fixes #2785

From https://github.com/OpenSC/OpenSC/issues/2785:
The newly found issue exists in pkcs15-init module. Like the original bug in libopensc,
cardos_have_verifyrc_package in pkcs15-cardos.c scans an ans1 buffer for 2 tags.
The pointer p is moved after each sc_asn1_find_tag invocation,
which results in the miscalculation of the length of left bytes in buffer
and hence reading beyond the end of the buffer.

CVE-2023-2977 was assigned for this issue.
fullwaywang <fullwaywang@tencent.com> no https://github.com/OpenSC/OpenSC/commit/81944d1529202bd28359bede57c0a15deb65ba8a 2023-05-29
0006-CVE-2023-4535.patch NULL pointer fix
Thanks to the clang analyzer:
Null pointer passed to 2nd parameter expecting 'nonnull'
[clang-analyzer-core.NonNullParamChecker]

modified: src/libopensc/card-myeid.c
Peter Popovec <popovec.peter@gmail.com> no https://github.com/OpenSC/OpenSC/commit/cde2e050ec4f2f1b7db38429aa4e9c0f4656308c 2023-04-26
0007-CVE-2023-4535.patch myeid: fixed CID 380538 Out-of-bounds read (OVERRUN)
also fixes output buffer size checking
Peter Popovec <popovec.peter@gmail.com> no https://github.com/OpenSC/OpenSC/commit/f1993dc4e0b33050b8f72a3558ee88b24c4063b2 2023-06-27
0008-CVE-2023-40660.patch Fixed PIN authentication bypass
If two processes are accessing a token, then one process may leave the
card usable with an authenticated PIN so that a key may sign/decrypt any
data. This is especially the case if the token does not support a way of
resetting the authentication status (logout).

We have some tracking of the authentication status in software via
PKCS#11, Minidriver (os-wise) and CryptoTokenKit, which is why a
PIN-prompt will appear even though the card may technically be unlocked
as described in the above example. However, before this change, an empty
PIN was not verified (likely yielding an error during PIN-verification),
but it was just checked whether the PIN is authenticated. This defeats
the purpose of the PIN verification, because an empty PIN is not the
correct one. Especially during OS Logon, we don't want that kind of
shortcut, but we want the user to verify the correct PIN (even though
the token was left unattended and authentication at the computer).

This essentially reverts commit e6f7373ef066cfab6e3162e8b5f692683db23864.
Frank Morgner <frankmorgner@gmail.com> no https://github.com/OpenSC/OpenSC/commit/868f76fb31255fd3fdacfc3e476452efeb61c3e7 2023-06-21
0009-CVE-2023-40661.patch pkcs15: Avoid buffer overflow when getting last update
Thanks oss-fuzz

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=60769
Jakub Jelen <jjelen@redhat.com> no https://github.com/OpenSC/OpenSC/commit/245efe608d083fd4e4ec96793fdefd218e26fde7 2023-08-17
0010-CVE-2023-40661.patch setcos: Avoid buffer underflow
Thanks oss-fuzz

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=60672
Jakub Jelen <jjelen@redhat.com> no https://github.com/OpenSC/OpenSC/commit/440ca666eff10cc7011901252d20f3fc4ea23651 2023-08-17
0011-CVE-2023-40661.patch oberthur: Avoid buffer overflow
Thanks oss-fuzz

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=60650
Jakub Jelen <jjelen@redhat.com> no https://github.com/OpenSC/OpenSC/commit/41d61da8481582e12710b5858f8b635e0a71ab5e 2023-09-20
0012-CVE-2023-40661.patch sc_pkcs15init_rmdir: prevent out of bounds write
fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53927
Frank Morgner <frankmorgner@gmail.com> no https://github.com/OpenSC/OpenSC/commit/578aed8391ef117ca64a9e0cba8e5c264368a0ec 2022-12-08
CVE-2023-5992/04-0494e46.patch framework-pkcs15.c: Handle PKCS#1 v1.5 depadding constant-time
In order to not disclose time side-channel when the depadding
fails, do the same operations as for case when depadding ends
with success.
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/0494e46a39ed52a5f81216e88a8a994bb6b7b280 2023-11-16
CVE-2023-5992/05-5b5fcc9.patch mechanism: Handle PKCS#1 v1.5 depadding constant-time Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/5b5fcc983b37f0d3587f61fd986026647e88c323 2024-01-08
CVE-2023-5992/06-e018f19.patch minidriver: Make CardRSADecrypt constant-time Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/e018f1941bb8630b5ef8cc08b80182d801f4114e 2023-11-22
CVE-2023-5992/07-2d84cec.patch pkcs11-object: Remove return value logging
To prevent Marvin attack on RSA PKCS#1 v1.5 padding
when logging the return value, signaling the padding error.
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/2d84cec2fc6f5093387d29b0bbc808b24e043b00 2023-11-24
CVE-2023-5992/08-b31f82b.patch misc: Compare return value constant-time Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/b31f82bcebb2a3b53348a1b16f038fce4d3ed9bb 2023-11-24
CVE-2023-5992/09-5747804.patch unittests: Do not use uninitialized memory
Thanks Coverity CID 414676, 414677, 414678,
414679, 414680, 414681, 414682, 414683, 414684,
414685, 414686
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/5747804c645c3d57d69a0ec733697d79e5b66f7b 2024-02-05
CVE-2024-8443/01-b28a3ce.patch openpgp: Do not accept non-matching key responses
When generating RSA key pair using PKCS#15 init, the driver could accept
responses relevant to ECC keys, which made further processing in the
pkcs15-init failing/accessing invalid parts of structures.

Thanks oss-fuzz!
Jakub Jelen <jjelen@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/b28a3cef416fcfb92fbb9ea7fd3c71df52c6c9fc 2024-08-12
CVE-2024-8443/02-02e8474.patch openpgp: Avoid buffer overflow when writing fingerprint
Fix also surrounding code to return error (not just log it)
when some step fails.

Thanks oss-fuzz
Jakub Jelen <jjelen@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/02e847458369c08421fd2d5e9a16a5f272c2de9e 2024-08-15
CVE-2024-45616/01-76115e3.patch gids: Avoid using uninitialized memory
Thanks Matteo Marini for report
Jakub Jelen <jjelen@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/76115e34799906a64202df952a8a9915d30bc89d 2024-05-20
CVE-2024-45615/01-bde991b.patch pkcs15init: Avoid using uninitialized memory
Thanks Matteo Marini for report
Jakub Jelen <jjelen@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/bde991b0fe4f0250243b0e4960978b1043c13b03 2024-05-20
CVE-2024-45616/02-e7177c7.patch cac: Correctly calculate certificate length based on the resplen
Thanks Matteo Marini for report
Jakub Jelen <jjelen@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/e7177c7ca00200afea820d155dca67f38b232967 2024-05-20
CVE-2024-45615/02-5e4f26b.patch cac: Fix uninitialized values
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/5e4f26b510b04624386c54816bf26aacea0fe4a1 2024-07-11
CVE-2024-45617/01-fdb9e90.patch cac: Check return value when selecting AID
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/fdb9e903eb124b6b18a5a9350a26eceb775585bc 2024-07-16
CVE-2024-45619/01-f01bfbd.patch pkcs15-tcos: Check number of read bytes for cert
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/f01bfbd19b9c8243a40f7f17d554fe0eb9e89d0d 2024-07-16
CVE-2024-45617/02-21d869b.patch cardos: Return error when response length is 0
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/21d869b77792b6f189eebf373e399747177d99e2 2024-07-16
CVE-2024-45615/04-7d68a7f.patch card-piv: Initialize variables for tag and CLA
In case they are not later initialize later by
sc_asn1_read_tag() function.

Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/7d68a7f442e38e16625270a0fdc6942c9e9437e6 2024-07-16
CVE-2024-45615/05-42d718d.patch pkcs15-sc-hsm: Initialize variables for tag and CLA
In case they are not later initialize later by
sc_asn1_read_tag() function.

Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/42d718dfccd2a10f6d26705b8c991815c855fa3b 2024-07-16
CVE-2024-45619/02-6730656.patch pkcs15-gemsafeV1: Check length of buffer for object
Number of actually read bytes may differ from
the stated object length.

Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/673065630bf4aaf03c370fc791ef6a6239431214 2024-07-17
CVE-2024-45617/03-efbc14f.patch card-jpki: Check number of read bytes
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/efbc14ffa190e3e0ceecceb479024bb778b0ab68 2024-07-17
CVE-2024-45618/01-8632ec1.patch pkcs15-tcos: Check return value of serial num conversion
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/8632ec172beda894581d67eaa991e519a7874f7d 2024-07-17
CVE-2024-45619/03-a1d8c01.patch pkcs15-tcos: Check certificate length before accessing
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/a1d8c01c1cabd115dda8c298941d1786fb4c5c2f 2024-07-17
CVE-2024-45618/02-f9d6866.patch pkcs15-lib: Report transport key error
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/f9d68660f032ad4d7803431d5fc7577ea8792ac3 2024-07-17
CVE-2024-45620/01-a1bcc65.patch pkcs15-starcos: Check length of file to be non-zero
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/a1bcc6516f43d570899820d259b71c53f8049168 2024-07-18
CVE-2024-45620/02-6baa195.patch iasecc-sdo: Check length of data before dereferencing
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/6baa19596598169d652659863470a60c5ed79ecd 2024-07-18
CVE-2024-45616/08-ef7b10a.patch card-oberthur: Check length of serial number
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/ef7b10a18e6a4d4f03f0c47ea81aa8136f3eca60 2024-07-18
CVE-2024-45619/04-e20ca25.patch pkcs15-setcos: Check length of generated key
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/e20ca25204c9c5e36f53ae92ddf017cd17d07e31 2024-07-18
CVE-2024-45620/03-468a314.patch iasecc-sdo: Check length of data when parsing
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/468a314d76b26f724a551f2eb339dd17c856cf18 2024-07-18
CVE-2024-45619/05-2b6cd52.patch pkcs15-sc-hsm: Properly check length of file list
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/2b6cd52775b5448f6a993922a30c7a38d9626134 2024-07-18
CVE-2024-45619/06-dd554a2.patch card-coolkey: Check length of buffer before conversion
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/dd554a2e1e31e6cb75c627c653652696d61e8de8 2024-07-18
CVE-2024-45616/09-aa102cd.patch card-entersafe: Check length of serial number
Thanks Matteo Marini for report
Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/aa102cd9abe1b0eaf537d9dd926844a46060d8bc 2024-07-23
CVE-2024-45616/10-265b283.patch card-cardos: Check length of APDU response Veronika Hanulíková <vhanulik@redhat.com> yes debian upstream https://github.com/OpenSC/OpenSC/commit/265b28344d036a462f38002d957a0636fda57614 2024-08-01

All known versions for source package 'opensc'

Links