MGASA-2020-0026

Source
https://advisories.mageia.org/MGASA-2020-0026.html
Import Source
https://advisories.mageia.org/MGASA-2020-0026.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0026
Related
Published
2020-01-07T21:19:56Z
Modified
2020-01-07T20:58:51Z
Summary
Updated opensc packages fix security vulnerability
Details

Updated opensc packages fix security vulnerabilities:

sccontextcreate in ctx.c in libopensc in OpenSC 0.19.0 has a memory leak, as demonstrated by a call from eidenv (CVE-2019-6502).

OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Bitstring in decodebitstring in libopensc/asn1.c (CVE-2019-15945).

OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1decodeentry in libopensc/asn1.c (CVE-2019-15946).

An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during parsing of a SETCOS file attribute (CVE-2019-19479).

An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in scpkcs15decodeprkdfentry (CVE-2019-19480).

An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-cac1.c mishandles buffer limits for CAC certificates (CVE-2019-19481).

The opensc package has been updated to version 0.20.0, which has fixes for these issues and other improvements.

References
Credits

Affected packages