opensc: CVE-2023-4535

Related Vulnerabilities: CVE-2023-4535   CVE-2023-40660   CVE-2023-40661  

Debian Bug report logs - #1055520
opensc: CVE-2023-4535

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Tue, 7 Nov 2023 19:57:02 UTC

Severity: important

Tags: security, upstream

Found in version opensc/0.23.0-1

Fixed in version opensc/0.23.0-2

Done: Bastian Germann <bage@debian.org>

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Debian OpenSC Maintainers <pkg-opensc-maint@lists.alioth.debian.org>:
Bug#1055520; Package src:opensc. (Tue, 07 Nov 2023 19:57:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Debian OpenSC Maintainers <pkg-opensc-maint@lists.alioth.debian.org>. (Tue, 07 Nov 2023 19:57:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: opensc: CVE-2023-4535
Date: Tue, 07 Nov 2023 20:55:17 +0100
Source: opensc
Version: 0.23.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for opensc.

CVE-2023-4535[0]:
| An out-of-bounds read vulnerability was found in OpenSC packages
| within the MyEID driver when handling symmetric key encryption.
| Exploiting this flaw requires an attacker to have physical access to
| the computer and a specially crafted USB device or smart card. This
| flaw allows the attacker to manipulate APDU responses and
| potentially gain unauthorized access to sensitive data, compromising
| the system's security.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-4535
    https://www.cve.org/CVERecord?id=CVE-2023-4535
[1] https://github.com/OpenSC/OpenSC/wiki/CVE-2023-4535
[2] https://github.com/OpenSC/OpenSC/commit/f1993dc4e0b33050b8f72a3558ee88b24c4063b2

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#1055520. (Wed, 08 Nov 2023 00:33:04 GMT) (full text, mbox, link).


Message #8 received at 1055520-submitter@bugs.debian.org (full text, mbox, reply):

From: Bastian Germann <noreply@salsa.debian.org>
To: 1055520-submitter@bugs.debian.org
Subject: Bug#1055520 marked as pending in opensc
Date: Wed, 08 Nov 2023 00:28:50 +0000
Control: tag -1 pending

Hello,

Bug #1055520 in opensc reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/opensc-team/opensc/-/commit/8c1cd9adbe9d6ae6ae554fcd861084241d96431b

------------------------------------------------------------------------
Fix CVE-2023-4535 with two upstream patches (Closes: #1055520)
------------------------------------------------------------------------

(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/1055520



Added tag(s) pending. Request was from Bastian Germann <noreply@salsa.debian.org> to 1055520-submitter@bugs.debian.org. (Wed, 08 Nov 2023 00:33:04 GMT) (full text, mbox, link).


Reply sent to Bastian Germann <bage@debian.org>:
You have taken responsibility. (Wed, 08 Nov 2023 00:51:03 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Wed, 08 Nov 2023 00:51:03 GMT) (full text, mbox, link).


Message #15 received at 1055520-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 1055520-close@bugs.debian.org
Subject: Bug#1055520: fixed in opensc 0.23.0-2
Date: Wed, 08 Nov 2023 00:49:21 +0000
Source: opensc
Source-Version: 0.23.0-2
Done: Bastian Germann <bage@debian.org>

We believe that the bug you reported is fixed in the latest version of
opensc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1055520@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Germann <bage@debian.org> (supplier of updated opensc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 08 Nov 2023 01:26:46 +0100
Source: opensc
Architecture: source
Version: 0.23.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSC Maintainers <pkg-opensc-maint@lists.alioth.debian.org>
Changed-By: Bastian Germann <bage@debian.org>
Closes: 1055520 1055521 1055522
Changes:
 opensc (0.23.0-2) unstable; urgency=medium
 .
   * Team upload
   * Fix CVE-2023-4535 with two upstream patches (Closes: #1055520)
   * Fix CVE-2023-40660 with upstream patch (Closes: #1055521)
   * Fix CVE-2023-40661 with upstream patches (Closes: #1055522)
Checksums-Sha1:
 76c468d9c8e9d443f92e98aaf01e0585101294c9 2012 opensc_0.23.0-2.dsc
 e5ddbe948317d4b8cd70d1f6430be93cb6400a7a 23572 opensc_0.23.0-2.debian.tar.xz
 23d1b794b5e9014ae1cff6c59da6897c31219fea 6929 opensc_0.23.0-2_source.buildinfo
Checksums-Sha256:
 350ec0f21a00a6ff83b822ee4911c88f559b101a22cfd2876c3cf2406e86be9f 2012 opensc_0.23.0-2.dsc
 a9f8020f176a8df5005348de9db71786c2f20da65b6166168dbe1bd75eef56a3 23572 opensc_0.23.0-2.debian.tar.xz
 ef54460b4e0498e269daf9daf1029ed2674f91642fcd71b6863297b745afcaf3 6929 opensc_0.23.0-2_source.buildinfo
Files:
 4a492105a5443a6d672d500a83eb7939 2012 utils optional opensc_0.23.0-2.dsc
 5ed855e8f6cfd17c045a97a3902da186 23572 utils optional opensc_0.23.0-2.debian.tar.xz
 16012c5b6a48c472bdfaf249f2b9f8bd 6929 utils optional opensc_0.23.0-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=2Pb7
-----END PGP SIGNATURE-----




Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Nov 8 17:55:53 2023; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.