ALT-BU-2019-4019-1
Branch c8.1 update bulletin.
Closed vulnerabilities
BDU:2019-00848
Уязвимость реализации функции «cssp_read_tsrequest» RDP-клиента rdesktop, связанная с чтением за пределами границы памяти, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-00849
Уязвимость реализации функции «rdpdr_process» RDP-клиента rdesktop, связанная с чтением за пределами границы памяти, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-00850
Уязвимость реализации функции «cssp_read_tsrequest» RDP-клиента rdesktop, связанная с переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-00851
Уязвимость реализации функции «process_bitmap_updates» RDP-клиента rdesktop, связанная с целочисленным переполнением, которое приводит к записи за пределы функции, позволяющая нарушителю выполнить произвольный код
BDU:2019-00852
Уязвимость реализации функции process_bitmap_updates() RDP-клиента rdesktop, связанная с целочисленным переполнением, которое приводит к переполнению кучи, позволяющая нарушителю выполнить произвольный код
BDU:2019-00853
Уязвимость реализации функции process_bitmap_updates() RDP-клиента rdesktop, связанная с чтением за пределами границы памяти, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-00854
Уязвимость реализации функции «process_plane» RDP-клиента rdesktop, связанная с переполнением буфера, позволяющая нарушителю выполнить произвольный код
BDU:2019-00855
Уязвимость реализации функции «rdpsnd_process_ping» RDP-клиента rdesktop, связанная с чтением за пределами границы памяти, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-00856
Уязвимость реализации функции «process_secondary_order» RDP-клиента rdesktop, связанная с чтением за пределами границы памяти, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-00857
Уязвимость реализации функции «ui_clip_handle_data» RDP-клиента rdesktop, связанная с переполнением буфера, позволяющая нарушителю выполнить произвольный код
BDU:2019-01579
Уязвимость функции ui_clip_handle_data RDP-клиента rdesktop, связанная с чтением за пределами границы буфера, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-01580
Уязвимость файла RDP-клиента rdesktop, связанная с чтением за пределами границы буфера, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-01581
Уязвимость RDP-клиента rdesktop, связанная с чтением за пределами границы буфера, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-01582
Уязвимость функции rdp_in_unistr RDP-клиента rdesktop, связанная с целочисленным переполнением, приводящим к переполнению буфера на основе кучи, позволяющая нарушителю выполнить произвольный код
BDU:2019-01583
Уязвимость функции process_demand_active RDP-клиента rdesktop, связанная с чтением за пределами границы буфера, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-01584
Уязвимость функции lspci_process RDP-клиента rdesktop, связанная с целочисленным переполнением, приводящим к переполнению буфера на основе кучи, позволяющая нарушителю выполнить произвольный код
BDU:2019-01585
Уязвимость функции rdpsnddbg_process RDP-клиента rdesktop, связанная с целочисленным переполнением, приводящим к переполнению буфера на основе кучи, позволяющая нарушителю выполнить произвольный код
BDU:2019-01586
Уязвимость функции seamless_process RDP-клиента rdesktop, связанная с целочисленным переполнением, приводящим к переполнению буфера на основе кучи, позволяющая нарушителю выполнить произвольный код
BDU:2019-01587
Уязвимость функции seamless_process_line RDP-клиента rdesktop, связанная с переполнение буфера, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-20174
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20175
rdesktop versions up to and including v1.8.3 contains several Integer Signedness errors that lead to Out-Of-Bounds Reads in the file mcs.c and result in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20176
rdesktop versions up to and including v1.8.3 contain several Out-Of- Bounds Reads in the file secure.c that result in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20177
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in the function rdp_in_unistr() and results in memory corruption and possibly even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20178
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function process_demand_active() that results in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20179
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function lspci_process() and results in memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20180
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20181
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20182
rdesktop versions up to and including v1.8.3 contain a Buffer Overflow over the global variables in the function seamless_process_line() that results in memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8791
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpdr_process() that results in an information leak.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8792
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8793
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function cssp_read_tsrequest() that results in a memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8794
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8795
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8796
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_bitmap_updates() that results in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8797
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function process_plane() that results in a memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8798
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpsnd_process_ping() that results in an information leak.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8800
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Closed bugs
[CVE] надо собрать 1.8.4
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Package php7-openssl updated to version 7.2.23-alt1.1 for branch c8.1 in task 239066.
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Package php7-pdo_mysql updated to version 7.2.23-alt1 for branch c8.1 in task 239066.
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Package php7-pgsql updated to version 7.2.23-alt1.2 for branch c8.1 in task 239066.
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Package php7-opcache updated to version 7.2.23-alt1.1 for branch c8.1 in task 239066.
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Package php7-xmlrpc updated to version 7.2.23-alt1 for branch c8.1 in task 239066.
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Closed vulnerabilities
BDU:2020-01691
Уязвимость функции onig_new_deluxe библиотеки регулярных выражений для многобайтовых строк libonig, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- [debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
- FEDORA-2019-5409bb5e68
- FEDORA-2019-5409bb5e68
- FEDORA-2019-3f3d0953db
- FEDORA-2019-3f3d0953db
- GLSA-201911-03
- GLSA-201911-03
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K00103182?utm_source=f5support&%3Butm_medium=RSS
- USN-4088-1
- USN-4088-1
Package opensc-compat updated to version 0.16.0-alt3.M80P.2 for branch c8.1 in task 239087.
Closed vulnerabilities
BDU:2022-00268
Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00332
Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-16391
Several buffer overflows when handling responses from a Muscle Card in muscle_list_files in libopensc/card-muscle.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16392
Several buffer overflows when handling responses from a TCOS Card in tcos_select_file in libopensc/card-tcos.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b2a356323a9ff2024d041cf2d7e89dd3
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b2a356323a9ff2024d041cf2d7e89dd3
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16393
Several buffer overflows when handling responses from a Gemsafe V1 Smartcard in gemsafe_get_cert_len in libopensc/pkcs15-gemsafeV1.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16418
A buffer overflow when handling string concatenation in util_acl_to_str in tools/util.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-628c8445c4e7ae92bbc4be08ba11a4c3
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-628c8445c4e7ae92bbc4be08ba11a4c3
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16419
Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-a6074523a9cbd875e26c58e20868fb15
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-a6074523a9cbd875e26c58e20868fb15
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b36536074d13447fbbec061e0e64d15d
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b36536074d13447fbbec061e0e64d15d
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16421
Several buffer overflows when handling responses from a CAC Card in cac_get_serial_nr_from_CUID in libopensc/card-cac.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-848b13147a344ba2c6361d91ca77feb1
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-848b13147a344ba2c6361d91ca77feb1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16422
A single byte buffer overflow when handling responses from an esteid Card in sc_pkcs15emu_esteid_init in libopensc/pkcs15-esteid.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d64c08c80437cf0006ada91e50f20ba0
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d64c08c80437cf0006ada91e50f20ba0
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16423
A double free when handling responses from a smartcard in sc_file_set_sec_attr in libopensc/sc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-db0cd89ff279ad8c7b3bb780cdf2770a
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-db0cd89ff279ad8c7b3bb780cdf2770a
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16424
A double free when handling responses in read_file in tools/egk-tool.c (aka the eGK card tool) in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-476b3b2a03c4eef331b4b0bfece4b063
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-476b3b2a03c4eef331b4b0bfece4b063
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16425
A double free when handling responses from an HSM Card in sc_pkcs15emu_sc_hsm_init in libopensc/pkcs15-sc-hsm.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16426
Endless recursion when handling responses from an IAS-ECC card in iasecc_select_file in libopensc/card-iasecc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to hang or crash the opensc library using programs.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54
- https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16427
Various out of bounds reads when handling responses in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to potentially crash the opensc library using programs.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
- https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2019-15945
OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c.
- [oss-security] 20191229 OpenSC 0.20.0 released
- [oss-security] 20191229 OpenSC 0.20.0 released
- https://github.com/OpenSC/OpenSC/commit/412a6142c27a5973c61ba540e33cdc22d5608e68
- https://github.com/OpenSC/OpenSC/commit/412a6142c27a5973c61ba540e33cdc22d5608e68
- https://github.com/OpenSC/OpenSC/compare/f1691fc...12218d4
- https://github.com/OpenSC/OpenSC/compare/f1691fc...12218d4
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update
- [debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update
- FEDORA-2020-3c93790abe
- FEDORA-2020-3c93790abe
Modified: 2024-11-21
CVE-2019-15946
OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c.
- [oss-security] 20191229 OpenSC 0.20.0 released
- [oss-security] 20191229 OpenSC 0.20.0 released
- https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740
- https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740
- https://github.com/OpenSC/OpenSC/compare/f1691fc...12218d4
- https://github.com/OpenSC/OpenSC/compare/f1691fc...12218d4
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update
- [debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update
- FEDORA-2020-3c93790abe
- FEDORA-2020-3c93790abe