SB2022080536 - Multiple vulnerabilities in OpenSC
Published: August 5, 2022 Updated: August 5, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Double Free (CVE-ID: CVE-2021-42778)
The vulnerability allows an attacker with physical access to perform a denial of service attack.
The vulnerability exists due to a boundary error. An attacker with physical access can pass specially crafted data to the application, trigger double free error, and perform a denial of service attack.
2) Use-after-free (CVE-ID: CVE-2021-42779)
The vulnerability allows an attacker with physical access to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in Opensc in sc_file_valid. An attacker with physical access can trigger use-after-free to perform a denial of service attack.
3) Heap-based buffer overflow (CVE-ID: CVE-2021-42781)
The vulnerability allows an attacker with physical access to perform denial of service attack.
The vulnerability exists due to a boundary error in Opensc before in pkcs15-oberthur.c. An attacker with physical access can pass specially crafted data to the application, trigger a heap-based buffer overflow and perform denial of service attack.
4) Stack-based buffer overflow (CVE-ID: CVE-2021-42782)
The vulnerability allows an attacker with physical access to perform a denial of service attack.
The vulnerability exists due to a boundary error in Opensc in various places. An attacker with physical access can trigger stack-based buffer overflow and perform a denial of service attack.
5) Unchecked Return Value (CVE-ID: CVE-2021-42780)
The vulnerability allows an attacker with physical access to perform denial of service attacks.
The vulnerability exists due to use after return issue in insert_pin() function in Opensc. An attacker with physical access can trigger the vulnerability to perform denial of service attacks.
Remediation
Install update from vendor's website.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2016083
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28185
- https://github.com/OpenSC/OpenSC/commit/f015746d
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843
- https://bugzilla.redhat.com/show_bug.cgi?id=2016086
- https://github.com/OpenSC/OpenSC/commit/1db88374
- https://bugzilla.redhat.com/show_bug.cgi?id=2016439
- https://github.com/OpenSC/OpenSC/commit/17d8980c
- https://github.com/OpenSC/OpenSC/commit/5d4daf6c
- https://github.com/OpenSC/OpenSC/commit/40c50a3a
- https://github.com/OpenSC/OpenSC/commit/05648b06
- https://github.com/OpenSC/OpenSC/commit/cae5c71f
- https://github.com/OpenSC/OpenSC/commit/1252aca9
- https://github.com/OpenSC/OpenSC/commit/7114fb71
- https://github.com/OpenSC/OpenSC/commit/78cdab94
- https://github.com/OpenSC/OpenSC/commit/ae1cf0be
- https://github.com/OpenSC/OpenSC/commit/456ac566
- https://bugzilla.redhat.com/show_bug.cgi?id=2016448
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383
- https://github.com/OpenSC/OpenSC/commit/5df913b7
- https://bugzilla.redhat.com/show_bug.cgi?id=2016139