[ubuntu/oracular-updates] opensc 0.25.1-2ubuntu1.1 (Accepted)
Ubuntu Archive Robot
ubuntu-archive-robot at lists.canonical.com
Wed Mar 12 06:28:17 UTC 2025
opensc (0.25.1-2ubuntu1.1) oracular-security; urgency=medium
* SECURITY UPDATE: Missing variable initialization
- debian/patches/CVE-2024-45615-1.patch: Fix uninitialized values
- debian/patches/CVE-2024-45615-2.patch: Initialize variables for tag and
CLA
- debian/patches/CVE-2024-45615-3.patch: Initialize OID length
- debian/patches/CVE-2024-45615-4.patch: Initialize variables for tag and
CLA
- debian/patches/CVE-2024-45615-5.patch: Avoid using uninitialized memory
- debian/patches/CVE-2024-45617-1.patch: Check return value when selecting
AID
- debian/patches/CVE-2024-45617-2.patch: Return error when response length
is 0
- debian/patches/CVE-2024-45617-3.patch: Check number of read bytes
- debian/patches/CVE-2024-45618-1.patch: Check return value of serial num
conversion
- debian/patches/CVE-2024-45618-2.patch: Report transport key error
- CVE-2024-45615
- CVE-2024-45617
- CVE-2024-45618
* SECURITY UPDATE: Buffer overflow
- debian/patches/CVE-2024-45616-1.patch: Fix uninitialized values
- debian/patches/CVE-2024-45616-2.patch: Check length of APDU response
- debian/patches/CVE-2024-45616-3.patch: Correctly calculate certificate
length based on the resplen
- debian/patches/CVE-2024-45616-4.patch: Check length of serial number
- debian/patches/CVE-2024-45616-5.patch: Use actual length of reponse
buffer
- debian/patches/CVE-2024-45616-6.patch: Check length of response buffer
in select
- debian/patches/CVE-2024-45616-7.patch: Check APDU response length and
ASN1 lengths
- debian/patches/CVE-2024-45616-8.patch: Report invalid SW when reading
object
- debian/patches/CVE-2024-45616-9.patch: Avoid using uninitialized memory
- debian/patches/CVE-2024-45616-10.patch: Check length of serial number
- debian/patches/CVE-2024-45619-1.patch: Check number of read bytes for cert
- debian/patches/CVE-2024-45619-2.patch: Check certificate length before
accessing
- debian/patches/CVE-2024-45619-3.patch: Check length of buffer for object
- debian/patches/CVE-2024-45619-4.patch: Check length of generated key
- debian/patches/CVE-2024-45619-5.patch: Properly check length of file list
- debian/patches/CVE-2024-45619-6.patch: Check length of buffer before
conversion
- debian/patches/CVE-2024-45620-1.patch: Check length of file to be non-zero
- debian/patches/CVE-2024-45620-2.patch: Check length of data before
dereferencing
- debian/patches/CVE-2024-45620-3.patch: Check length of data when parsing
- debian/patches/CVE-2024-8443-1.patch: Avoid buffer overflow when writing
fingerprint
- debian/patches/CVE-2024-8443-2.patch: Do not accept non-matching key
responses
- CVE-2024-45616
- CVE-2024-45619
- CVE-2024-45620
- CVE-2024-8443
Date: 2025-03-06 11:24:22.698753+00:00
Changed-By: Bruce Cable <bruce.cable at canonical.com>
Signed-By: Ubuntu Archive Robot <ubuntu-archive-robot at lists.canonical.com>
https://launchpad.net/ubuntu/+source/opensc/0.25.1-2ubuntu1.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the oracular-changes
mailing list