ALAS2-2023-2102

Related Vulnerabilities: CVE-2021-42779   CVE-2021-42780   CVE-2021-42781   CVE-2021-42782   CVE-2023-2977  

A heap use after free issue was found in Opensc before version 0.22.0 in sc_file_valid. (CVE-2021-42779) A use after return issue was found in Opensc before version 0.22.0 in insert_pin function that could potentially crash programs using the library. (CVE-2021-42780) Heap buffer overflow issues were found in Opensc before version 0.22.0 in pkcs15-oberthur.c that could potentially crash programs using the library. (CVE-2021-42781) Stack buffer overflow issues were found in Opensc before version 0.22.0 in various places that could potentially crash programs using the library. (CVE-2021-42782) A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible. (CVE-2023-2977)

ALAS2-2023-2102


Amazon Linux 2 Security Advisory: ALAS-2023-2102
Advisory Release Date: 2023-06-21 19:11 Pacific
Advisory Updated Date: 2023-06-29 19:46 Pacific
Severity: Medium

Issue Overview:

A heap use after free issue was found in Opensc before version 0.22.0 in sc_file_valid. (CVE-2021-42779)

A use after return issue was found in Opensc before version 0.22.0 in insert_pin function that could potentially crash programs using the library. (CVE-2021-42780)

Heap buffer overflow issues were found in Opensc before version 0.22.0 in pkcs15-oberthur.c that could potentially crash programs using the library. (CVE-2021-42781)

Stack buffer overflow issues were found in Opensc before version 0.22.0 in various places that could potentially crash programs using the library. (CVE-2021-42782)

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible. (CVE-2023-2977)


Affected Packages:

opensc


Issue Correction:
Run yum update opensc to update your system.

New Packages:
aarch64:
    opensc-0.19.0-5.amzn2.aarch64
    opensc-debuginfo-0.19.0-5.amzn2.aarch64

i686:
    opensc-0.19.0-5.amzn2.i686
    opensc-debuginfo-0.19.0-5.amzn2.i686

src:
    opensc-0.19.0-5.amzn2.src

x86_64:
    opensc-0.19.0-5.amzn2.x86_64
    opensc-debuginfo-0.19.0-5.amzn2.x86_64