Various out of bounds reads when handling responses in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to potentially crash the opensc library using programs.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1 | release notes third party advisory patch |
https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa | third party advisory patch |
https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/ | third party advisory |
https://access.redhat.com/errata/RHSA-2019:2154 | vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/09/msg00009.html | mailing list |