Angel Yankov
24eb6f5b62
* opensc: heap buffer overflow in OpenPGP driver when generating key * Added patch: opensc-CVE-2024-8443.patch - Security fix: [opensc-CVE-2024-45620, bsc#1230076] - Security fix: [opensc-CVE-2024-45619, bsc#1230075] - Security fix: [opensc-CVE-2024-45618, bsc#1230074] - Security fix: [opensc-CVE-2024-45617, bsc#1230073] - Security fix: [opensc-CVE-2024-45616, bsc#1230072] - Security fix: [opensc-CVE-2024-45615, bsc#1230071] * opensc: pkcs15init: Usage of uninitialized values in libopensc and pkcs15init * opensc: Uninitialized values after incorrect check or usage of APDU response values in libopensc * opensc: Uninitialized values after incorrect or missing checking return values of functions in libopensc * opensc: Uninitialized values after incorrect or missing checking return values of functions in pkcs15init * opensc: Incorrect handling length of buffers or files in libopensc * opensc: Incorrect handling of the length of buffers or files in pkcs15init * Added patches: - opensc-CVE-2024-45615.patch - opensc-CVE-2024-45616.patch - opensc-CVE-2024-45617.patch - opensc-CVE-2024-45618.patch - opensc-CVE-2024-45619.patch - opensc-CVE-2024-45620.patch OBS-URL: https://build.opensuse.org/package/show/security:chipcard/opensc?expand=0&rev=88
32 lines
1.1 KiB
Diff
32 lines
1.1 KiB
Diff
diff --git a/src/tools/opensc-explorer.c b/src/tools/opensc-explorer.c
|
|
index 41e620a..57f8a79 100644
|
|
--- a/src/tools/opensc-explorer.c
|
|
+++ b/src/tools/opensc-explorer.c
|
|
@@ -1839,6 +1839,12 @@ static int do_apdu(int argc, char **argv)
|
|
if (argc < 1)
|
|
return usage(do_apdu);
|
|
|
|
+ /* gcc-11 complains about BUF potentially being used without being
|
|
+ initialized. I can't convince myself that the calls to
|
|
+ parse_string_or_hexdata will fully initialize it, so we just
|
|
+ initialize it here. */
|
|
+ memset (buf, 0, sizeof (buf));
|
|
+
|
|
/* loop over the args and parse them, making sure the result fits into buf[] */
|
|
for (i = 0, len = 0; i < (unsigned) argc && len < sizeof(buf); i++) {
|
|
size_t len0 = sizeof(buf) - len;
|
|
commit 1680b3a1fb15319e41dbe3214ef8c4a4c215d529
|
|
Author: Jakub Jelen <jjelen@redhat.com>
|
|
Date: Tue Feb 23 19:57:02 2021 +0100
|
|
|
|
Fix build on gcc11
|
|
|
|
This made most of the applications crashing in Fedora 34 when
|
|
smart card was plugged in.
|
|
|
|
The suggested patch makes the code path more obvious for gcc to
|
|
handle.
|
|
|
|
https://bugzilla.redhat.com/show_bug.cgi?id=1930652
|
|
|