Security update for opensc

SUSE Security Update: Security update for opensc
Announcement ID: SUSE-SU-2021:0998-1
Rating: moderate
References: #1149746 #1149747 #1158256 #1177364 #1177378 #1177380
Cross-References:CVE-2019-15945 CVE-2019-15946 CVE-2019-19479 CVE-2020-26570 CVE-2020-26571 CVE-2020-26572
Affected Products:
  • SUSE Linux Enterprise Server 12-SP5

An update that fixes 6 vulnerabilities is now available.


This update for opensc fixes the following issues:

  • CVE-2020-26571: gemsafe GPK smart card software driver stack-based buffer overflow (bsc#1177380)
  • CVE-2019-15946: out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry (bsc#1149747)
  • CVE-2019-15945: out-of-bounds access of an ASN.1 Bitstring in decode_bit_string (bsc#1149746)
  • CVE-2019-19479: incorrect read operation during parsing of a SETCOS file attribute (bsc#1158256)
  • CVE-2020-26572: Prevent out of bounds write (bsc#1177378)
  • CVE-2020-26570: Fix buffer overflow in sc_oberthur_read_file (bsc#1177364)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-998=1

Package List:

  • SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
    • opensc-0.13.0-3.11.1
    • opensc-debuginfo-0.13.0-3.11.1
    • opensc-debugsource-0.13.0-3.11.1