Bug 2309288 (CVE-2024-45619)

Summary: CVE-2024-45619 libopensc: Incorrect handling length of buffers or files in libopensc
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2024-09-02 18:36:46 UTC
The reported issues are part of the libopensc library, which makes them
accessible from OpenSC tools, PKCS#11 module, minidriver, or CTK.
The attack requires a crafted USB device or smart card that would present
the system with specially crafted responses to the APDUs, so they are
considered high complexity and low severity.

When buffers are partially filled with data, uninitialized parts of the
buffer can be incorrectly accessed.
The uninitialized variables were reflected in the following functions:

- insert_cert
- asn1_encode_path
- gemsafe_get_cert_len
- setcos_generate_key
- sc_hsm_determine_free_id
- coolkey_rsa_op

Originally reported by Matteo Marini (Sapienza University of Rome)