Bug 25975 - opensc new security issues CVE-2019-6502, CVE-2019-1594[56], CVE-2019-19479, and CVE-2019-1948[01]
Summary: opensc new security issues CVE-2019-6502, CVE-2019-1594[56], CVE-2019-19479, ...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2019-12-27 05:39 CET by David Walser
Modified: 2020-11-05 22:09 CET (History)
5 users (show)

See Also:
Source RPM: opensc-0.19.0-1.mga7.src.rpm
CVE:
Status comment: Fixed upstream in 0.20.0


Attachments

Description David Walser 2019-12-27 05:39:41 CET
Debian-LTS has issued an advisory today (December 26):
https://www.debian.org/lts/security/2019/dla-2046

Mageia 7 is also affected.
David Walser 2019-12-27 05:39:48 CET

Whiteboard: (none) => MGA7TOO

Comment 1 David Walser 2019-12-30 20:17:05 CET
OpenSC 0.20.0 has been released, fixing this issue and several others:
https://www.openwall.com/lists/oss-security/2019/12/29/1

Status comment: (none) => Fixed upstream in 0.20.0
Summary: opensc new security issue CVE-2019-19479 => opensc new security issues CVE-2019-6502, CVE-2019-1594[56], CVE-2019-19479, and CVE-2019-1948[01]

Comment 2 David Walser 2020-01-04 12:28:26 CET
Updated packages uploaded for Mageia 7 and Cauldron by myself and Sander.

opensc-0.20.0-1.mga7
libopensc6-0.20.0-1.mga7
libsmm-local6-0.20.0-1.mga7
libopensc-devel-0.20.0-1.mga7

from opensc-0.20.0-1.mga7.src.rpm

Advisory to come later.

Version: Cauldron => 7
Assignee: mageia => qa-bugs
Whiteboard: MGA7TOO => (none)
CC: (none) => mageia

Comment 3 David Walser 2020-01-05 05:11:03 CET
Advisory:
========================

Updated opensc packages fix security vulnerabilities:

sc_context_create in ctx.c in libopensc in OpenSC 0.19.0 has a memory leak, as
demonstrated by a call from eidenv (CVE-2019-6502).

OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Bitstring in
decode_bit_string in libopensc/asn1.c (CVE-2019-15945).

OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string
in asn1_decode_entry in libopensc/asn1.c (CVE-2019-15946).

An issue was discovered in OpenSC through 0.19.0 and 0.20.x through
0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during
parsing of a SETCOS file attribute (CVE-2019-19479).

An issue was discovered in OpenSC through 0.19.0 and 0.20.x through
0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in
sc_pkcs15_decode_prkdf_entry (CVE-2019-19480).

An issue was discovered in OpenSC through 0.19.0 and 0.20.x through
0.20.0-rc3. libopensc/card-cac1.c mishandles buffer limits for CAC
certificates (CVE-2019-19481).

The opensc package has been updated to version 0.20.0, which has fixes for
these issues and other improvements.

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19481
https://github.com/OpenSC/OpenSC/releases/tag/0.20.0
https://www.openwall.com/lists/oss-security/2019/12/29/1
Comment 4 Herman Viaene 2020-01-06 15:28:17 CET
MGA7-64 Plasma on Lenovo B50
No installation issues.
Installed pcsc-lite, pcsc-tools and beid-middleware for testing, ref bug 23447.
# systemctl start pcscd
# systemctl -l status pcscd
● pcscd.service - PC/SC Smart Card Daemon
   Loaded: loaded (/usr/lib/systemd/system/pcscd.service; indirect; vendor preset: disabled)
   Active: active (running) since Mon 2020-01-06 15:12:47 CET; 3s ago
     Docs: man:pcscd(8)
 Main PID: 25719 (pcscd)
   Memory: 1.2M
   CGroup: /system.slice/pcscd.service
           └─25719 /usr/sbin/pcscd --foreground --auto-exit

jan 06 15:12:47 mach5.hviaene.thuis systemd[1]: Started PC/SC Smart Card Daemon.

Inserting my eid card in my Vasco eid reader:
 
$ opensc-explorer 
OpenSC Explorer version 0.20.0
Using reader with a card: VASCO DIGIPASS 870 [CCID] 00 00
OpenSC [3F00]> quit
[tester7@mach5 Documenten]$ eidenv 
Using reader with a card: VASCO DIGIPASS 870 [CCID] 00 00
BELPIC_CARDNUMBER: XXXXXXX
BELPIC_CHIPNUMBER: YYYYYYYYYYYYYYY
BELPIC_VALIDFROM: 24.02.2016
BELPIC_VALIDTILL: 24.02.2026
and more
All works OK

Whiteboard: (none) => MGA7-64-OK
CC: (none) => herman.viaene

Comment 5 Thomas Andrews 2020-01-07 00:22:53 CET
Validating. Advisory in Comment 3.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Thomas Backlund 2020-01-07 21:22:30 CET

CC: (none) => tmb
Keywords: (none) => advisory

Comment 6 Mageia Robot 2020-01-07 22:21:26 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2020-0026.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

Comment 7 David Walser 2020-11-05 22:09:41 CET
This update also fixed CVE-2019-20792:
https://access.redhat.com/errata/RHSA-2020:4483

Note You need to log in before you can comment on or make changes to this bug.