Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. External References: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/ Upstream Patch: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b36536074d13447fbbec061e0e64d15d
Created opensc tracking bugs for this issue: Affects: fedora-all [bug 1628028]
I verified that the vulnerable code is present in upstream commit 777e2a3751e3f6d53f056c98e9e20e42af674fb1 used by opensc 0:0.16.0-10.20170227git777e2a3.el7 Should I open a new bug to request a fix for RHEL-7 ?
I'm assuming bug 1628029 is already opened for this which will hopefully be resolved by the rebase in bug 1656791 for RHEL-7.7 ?
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2154 https://access.redhat.com/errata/RHSA-2019:2154
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-16420