Various out of bounds reads when handling responses in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to potentially crash the opensc library using programs. External References: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/ Upstream Patch: https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
Created opensc tracking bugs for this issue: Affects: fedora-all [bug 1628053]
The patch sections affecting src/libopensc/card-openpgp.c and src/libopensc/ef-gdo.c don't appear to apply to opensc-0.16.0, but the rest almost certainly do
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2154 https://access.redhat.com/errata/RHSA-2019:2154
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-16427