-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2018-fe4b72fa7d 2018-10-05 16:00:25.667519 --------------------------------------------------------------------------------
Name : opensc Product : Fedora 29 Version : 0.19.0 Release : 1.fc29 URL : https://github.com/OpenSC/OpenSC/wiki Summary : Smart card library and applications Description : OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitate their use in security applications such as authentication, mail encryption and digital signatures. OpenSC implements the PKCS#11 API so applications supporting this API (such as Mozilla Firefox and Thunderbird) can use it. On the card OpenSC implements the PKCS#15 standard and aims to be compatible with every software/card that does so, too.
-------------------------------------------------------------------------------- Update Information:
Security fix for CVE-2018-16418, CVE-2018-16419, CVE-2018-16420, CVE-2018-16421, CVE-2018-16423, CVE-2018-16424, CVE-2018-16425, CVE-2018-16426, CVE-2018-16427 + support for RSA-PSS signatures. -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1627998 - CVE-2018-16391 opensc: Buffer overflows handling responses from Muscle Cards in card-muscle.c:muscle_list_files() https://bugzilla.redhat.com/show_bug.cgi?id=1627998 [ 2 ] Bug #1628002 - CVE-2018-16392 opensc: Buffer overflows handling responses from TCOS Cards in card-tcos.c:tcos_select_file() https://bugzilla.redhat.com/show_bug.cgi?id=1628002 [ 3 ] Bug #1628006 - CVE-2018-16393 opensc: Buffer overflows handling responses from Gemsafe V1 Smartcards in pkcs15-gemsafeV1.c:gemsafe_get_cert_len() https://bugzilla.redhat.com/show_bug.cgi?id=1628006 [ 4 ] Bug #1628010 - CVE-2018-16418 opensc: Buffer overflow handling string concatention in tools/util.c:util_acl_to_str() https://bugzilla.redhat.com/show_bug.cgi?id=1628010 [ 5 ] Bug #1628013 - CVE-2018-16419 opensc: Buffer overflow handling responses from Cryptoflex cards in in cryptoflex-tool.c:read_public_key() https://bugzilla.redhat.com/show_bug.cgi?id=1628013 [ 6 ] Bug #1628016 - CVE-2018-16422 opensc: Buffer overflow handling responses from esteid cards in pkcs15-esteid.c:sc_pkcs15emu_esteid_init() https://bugzilla.redhat.com/show_bug.cgi?id=1628016 [ 7 ] Bug #1628020 - CVE-2018-16423 opensc: Double free handling responses from smartcards in libopensc/sc.c:sc_file_set_sec_attr() https://bugzilla.redhat.com/show_bug.cgi?id=1628020 [ 8 ] Bug #1628023 - CVE-2018-16425 opensc: Double free handling responses from HSM Cards in pkcs15-sc-hsm.c:sc_pkcs15emu_sc_hsm_init() https://bugzilla.redhat.com/show_bug.cgi?id=1628023 [ 9 ] Bug #1628026 - CVE-2018-16420 opensc: Buffer overflows handling responses from ePass 2003 Cards in card-epass2003.c:decrypt_response() https://bugzilla.redhat.com/show_bug.cgi?id=1628026 [ 10 ] Bug #1628034 - CVE-2018-16421 opensc: Buffer overflows handling responses from CAC Cards in card-cac.c:cac_get_serial_nr_from_CUID() https://bugzilla.redhat.com/show_bug.cgi?id=1628034 [ 11 ] Bug #1628040 - CVE-2018-16424 opensc: Double free handling responses from smartcards in tools/egk-tool.c:read_file() https://bugzilla.redhat.com/show_bug.cgi?id=1628040 [ 12 ] Bug #1628044 - CVE-2018-16426 opensc: Infinite recusrion handling responses from IAS-ECC cards in card-iasecc.c:iasecc_select_file() https://bugzilla.redhat.com/show_bug.cgi?id=1628044 [ 13 ] Bug #1628052 - CVE-2018-16427 opensc: Out of bounds reads handling responses from smartcards https://bugzilla.redhat.com/show_bug.cgi?id=1628052 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2018-fe4b72fa7d' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------
package-announce@lists.fedoraproject.org