File _patchinfo of Package patchinfo.11155
<patchinfo incident="11155">
<issue tracker="bnc" id="1149747">VUL-1: CVE-2019-15946: opensc: out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry</issue>
<issue tracker="bnc" id="1158256">VUL-1: CVE-2019-19479: opensc: incorrect read operation during parsing of a SETCOS file attribute</issue>
<issue tracker="bnc" id="1191957">VUL-0: CVE-2021-42782: opensc: opensc: Stack buffer overflow issues in various places</issue>
<issue tracker="bnc" id="1177364">VUL-0: CVE-2020-26570: opensc: Oberthur smart card software driver in OpenSC has a heap-based buffer overflow in sc_oberthur_read_file.</issue>
<issue tracker="bnc" id="1170809">VUL-1: CVE-2019-20792: opensc: double free in coolkey_free_private_data because coolkey_add_object in libopensc/card-coolkey.c lacks a uniqueness check</issue>
<issue tracker="bnc" id="1192005">VUL-1: CVE-2021-42780: opensc: Use after return in insert_pin function</issue>
<issue tracker="bnc" id="1177378">VUL-0: CVE-2020-26572: opensc: TCOS smart card software driver has a stack-based buffer overflow in tcos_decipher.</issue>
<issue tracker="bnc" id="1192000">VUL-0: CVE-2021-42781: opensc: Heap buffer overflow in pkcs15-oberthur.c</issue>
<issue tracker="bnc" id="1122756">VUL-1: CVE-2019-6502: opensc: memory leak in sc_context_create in ctx.c</issue>
<issue tracker="bnc" id="1177380">VUL-0: CVE-2020-26571: opensc: The gemsafe GPK smart card software driver has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.</issue>
<issue tracker="bnc" id="1149746">VUL-1: CVE-2019-15945: opensc: an out-of-bounds access of an ASN.1 Bitstring in decode_bit_string</issue>
<issue tracker="bnc" id="1158305">VUL-1: CVE-2019-19481: opensc: improper handling of buffer limits for CAC certificates</issue>
<issue tracker="bnc" id="1114649">Opensc software package command error</issue>
<issue tracker="bnc" id="1191992">VUL-1: CVE-2021-42779: opensc: opensc: Heap use after free in sc_file_valid</issue>
<issue tracker="cve" id="2021-42782"/>
<issue tracker="cve" id="2020-26571"/>
<issue tracker="cve" id="2019-20792"/>
<issue tracker="cve" id="2020-26572"/>
<issue tracker="cve" id="2019-15945"/>
<issue tracker="cve" id="2021-42780"/>
<issue tracker="cve" id="2019-19479"/>
<issue tracker="cve" id="2021-42781"/>
<issue tracker="cve" id="2021-42779"/>
<issue tracker="cve" id="2019-19481"/>
<issue tracker="cve" id="2019-6502"/>
<issue tracker="cve" id="2019-15946"/>
<issue tracker="cve" id="2020-26570"/>
<packager>mcalabkova</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for opensc</summary>
<description>This update for opensc fixes the following issues:
Security issues fixed:
- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).
- CVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
- CVE-2019-6502: Fixed a memory leak in sc_context_create() (bsc#1122756).
- CVE-2020-26570: Fixed a heap based buffer overflow in sc_oberthur_read_file (bsc#1177364).
- CVE-2020-26572: Prevent out of bounds write (bsc#1177378)
- CVE-2020-26571: gemsafe GPK smart card software driver stack-based buffer overflow (bsc#1177380)
- CVE-2019-15946: out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry (bsc#1149747)
- CVE-2019-19479: incorrect read operation during parsing of a SETCOS file attribute (bsc#1158256)
- CVE-2019-15945: Fixed an out-of-bounds access of an ASN.1 Bitstring in decode_bit_string (bsc#1149746).
- CVE-2019-19481: Fixed an improper handling of buffer limits for CAC certificates (bsc#1158305).
- CVE-2019-20792: Fixed a double free in coolkey_free_private_data (bsc#1170809).
Non-security issues fixed:
- Fixes segmentation fault in 'pkcs11-tool.c'. (bsc#1114649)
</description>
</patchinfo>