Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.20.0-3ubuntu0.1~esm2", "binary_name": "opensc" }, { "binary_version": "0.20.0-3ubuntu0.1~esm2", "binary_name": "opensc-dbgsym" }, { "binary_version": "0.20.0-3ubuntu0.1~esm2", "binary_name": "opensc-pkcs11" }, { "binary_version": "0.20.0-3ubuntu0.1~esm2", "binary_name": "opensc-pkcs11-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.22.0-1ubuntu2+esm1", "binary_name": "opensc" }, { "binary_version": "0.22.0-1ubuntu2+esm1", "binary_name": "opensc-dbgsym" }, { "binary_version": "0.22.0-1ubuntu2+esm1", "binary_name": "opensc-pkcs11" }, { "binary_version": "0.22.0-1ubuntu2+esm1", "binary_name": "opensc-pkcs11-dbgsym" } ] }