CVE-2024-8443

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-8443
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-8443.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-8443
Downstream
Related
Published
2024-09-10T14:15:13Z
Modified
2025-07-29T11:18:35.250830Z
Summary
[none]
Details

A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the pkcs15-init tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution.

References

Affected packages

Debian:11 / opensc

Package

Name
opensc
Purl
pkg:deb/debian/opensc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.21.0-1+deb11u1

Affected versions

0.*

0.21.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / opensc

Package

Name
opensc
Purl
pkg:deb/debian/opensc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23.0-0.3+deb12u2

Affected versions

0.*

0.23.0-0.3
0.23.0-0.3+deb12u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / opensc

Package

Name
opensc
Purl
pkg:deb/debian/opensc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.25.1-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}