Endless recursion when handling responses from an IAS-ECC card in iasecc_select_file in libopensc/card-iasecc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to hang or crash the opensc library using programs. External References: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/ Upstream Patch: https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54
Created opensc tracking bugs for this issue: Affects: fedora-all [bug 1628048]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2154 https://access.redhat.com/errata/RHSA-2019:2154
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-16426