-
Bug
-
Resolution: Unresolved
-
Normal
-
rhel-10.0
-
opensc-0.26.0-1.el10
-
No
-
Low
-
Rebase
-
1
-
rhel-sst-security-crypto
-
ssg_security
-
19
-
20
-
1
-
QE ack, Dev ack
-
False
-
-
Yes
-
Crypto24Q4
-
-
Pass
-
Not Needed
-
RegressionOnly
-
Rebase
-
-
Proposed
-
None
A new version of OpenSC 0.26.0 will be released in upstream. It contains additional fixes for removing the time side-channel leakage related to RSA PKCS#1 v1.5 padding removal after decryption, unified OpenSSL logging, several features for pkcs11-tool and fixes for CVEs targeting uninitialized memory problems.
CVEs fixed with this rebase:
- CVE-2024-45615: Usage of uninitialized values in libopensc and pkcs15init
- CVE-2024-45616: Uninitialized values after incorrect check or usage of APDU response values in libopensc
- CVE-2024-45617: Uninitialized values after incorrect or missing checking return values of functions in libopensc
- CVE-2024-45618: Uninitialized values after incorrect or missing checking return values of functions in pkcs15init
- CVE-2024-45619: Incorrect handling length of buffers or files in libopensc
- CVE-2024-45620: Incorrect handling of the length of buffers or files in pkcs15init
- CVE-2024-8443: Heap buffer overflow in OpenPGP driver when generating key
- links to
-
RHBA-2024:141123 opensc bug fix and enhancement update