Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.
{ "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "opensc", "binary_version": "0.20.0-3ubuntu0.1~esm4" }, { "binary_name": "opensc-dbgsym", "binary_version": "0.20.0-3ubuntu0.1~esm4" }, { "binary_name": "opensc-pkcs11", "binary_version": "0.20.0-3ubuntu0.1~esm4" }, { "binary_name": "opensc-pkcs11-dbgsym", "binary_version": "0.20.0-3ubuntu0.1~esm4" } ] }
{ "ubuntu_priority": "medium", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "opensc", "binary_version": "0.22.0-1ubuntu2+esm1" }, { "binary_name": "opensc-dbgsym", "binary_version": "0.22.0-1ubuntu2+esm1" }, { "binary_name": "opensc-pkcs11", "binary_version": "0.22.0-1ubuntu2+esm1" }, { "binary_name": "opensc-pkcs11-dbgsym", "binary_version": "0.22.0-1ubuntu2+esm1" } ] }