Operating System:

[Debian]

Published:

12 September 2019

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3459
                    DLA 1916-1: opensc security update
                             12 September 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           opensc
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-15946 CVE-2019-15945 CVE-2018-16427
                   CVE-2018-16426 CVE-2018-16425 CVE-2018-16424
                   CVE-2018-16423 CVE-2018-16422 CVE-2018-16421
                   CVE-2018-16420 CVE-2018-16419 CVE-2018-16418
                   CVE-2018-16393 CVE-2018-16392 CVE-2018-16391

Reference:         ESB-2019.2978
                   ESB-2018.3470.2

Original Bulletin: 
   https://security-tracker.debian.org/tracker/DLA-1916-1

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : opensc
Version        : 0.16.0-3+deb8u1
CVE ID         : CVE-2018-16391 CVE-2018-16392 CVE-2018-16393
                 CVE-2018-16418 CVE-2018-16419 CVE-2018-16420
                 CVE-2018-16421 CVE-2018-16422 CVE-2018-16423
                 CVE-2018-16424 CVE-2018-16425 CVE-2018-16426
                 CVE-2018-16427 CVE-2019-15945 CVE-2019-15946
Debian Bug     : 909444 939668 939669

Several security vulnerabilities were fixed in opensc, a set of
libraries and utilities to access smart cards that support
cryptographic operations.

Out-of-bounds reads, buffer overflows and double frees could be used
by attackers able to supply crafted smart cards to cause a denial of
service (application crash) or possibly have unspecified other impact.

For Debian 8 "Jessie", these problems have been fixed in version
0.16.0-3+deb8u1.

We recommend that you upgrade your opensc packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=TEKv
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=sSJu
-----END PGP SIGNATURE-----