Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
Created opensc tracking bugs for this issue:
Affects: fedora-all [bug 1628028]
I verified that the vulnerable code is present in upstream commit 777e2a3751e3f6d53f056c98e9e20e42af674fb1 used by opensc 0:0.16.0-10.20170227git777e2a3.el7
Should I open a new bug to request a fix for RHEL-7 ?
I'm assuming bug 1628029 is already opened for this which will hopefully be resolved by the rebase in bug 1656791 for RHEL-7.7 ?
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2019:2154 https://access.redhat.com/errata/RHSA-2019:2154
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):