Bug 1214591 (CVE-2021-34193) - VUL-0: CVE-2021-34193: opensc: stack overflow via crafted responses to APDUs
Summary: VUL-0: CVE-2021-34193: opensc: stack overflow via crafted responses to APDUs
Status: RESOLVED INVALID
Alias: CVE-2021-34193
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/376006/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-34193:4.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-24 15:17 UTC by Alexander Bergmann
Modified: 2023-11-08 10:23 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Alexander Bergmann 2023-08-24 15:22:19 UTC
Question to upstream about the situation:

https://github.com/OpenSC/OpenSC/issues/2841
Comment 2 Otto Hollmann 2023-09-04 14:06:13 UTC
As discussed upstream, this issue is duplicate for following CVEs:
CVE-2021-42778 opensc: Heap double free in sc_pkcs15_free_tokeninfo
CVE-2021-42779 opensc: Heap use after free in sc_file_valid
CVE-2021-42780 opensc: Use after return in insert_pin function
CVE-2021-42781 opensc: Heap buffer overflow in pkcs15-oberthur.c
CVE-2021-42782 opensc: Stack buffer overflow issues in various places

All of them are already fixed in our codestreams so I suggest to close this issue as invalid.

Upstream comment:
> https://github.com/OpenSC/OpenSC/issues/2841#issuecomment-1700853357