- Update to version 0.26.0 Security * CVE-2024-45615: Usage of uninitialized values in libopensc# and pkcs15init (#3225). * CVE-2024-45616: Uninitialized values after incorrect check or usage of APDU response values in libopensc (#3225) * CVE-2024-45617: Uninitialized values after incorrect or missing checking return values of functions in libopensc (#3225) * CVE-2024-45618: Uninitialized values after incorrect or missing checking return values of functions in pkcs15init (#3225) * CVE-2024-45619: Incorrect handling length of buffers or files in libopensc (#3225) * CVE-2024-45620: Incorrect handling of the length of buffers or files in pkcs15init (#3225) * CVE-2024-8443: Heap buffer overflow in OpenPGP driver when generating key (#3219) General improvements * Fix reselection of DF after error in PKCS#15 layer (#3067) * Unify OpenSSL logging throughout code (#2922) * Extend the p11test to support kryoptic (#3141) * Fix for error in PCSC reconnection (#3150) * Fixed various issues reported by OSS-Fuzz and Coverity in drivers, PKCS#11 and PKCS#15 layer PKCS#15 * Documentation for PKCS#15 profile files (#3132) minidriver * Support PinCacheAlwaysPrompt usable for PIV cards (#3167) pkcs11-tool * Show URI when listing token information (#3125) and objects * Do not limit size of objects to 5000 bytes (#3174) OBS-URL: https://build.opensuse.org/request/show/1224304 OBS-URL: https://build.opensuse.org/package/show/security:chipcard/opensc?expand=0&rev=90
79 lines
3.0 KiB
Diff
79 lines
3.0 KiB
Diff
commit b28a3cef416fcfb92fbb9ea7fd3c71df52c6c9fc
|
|
Author: Jakub Jelen <jjelen@redhat.com>
|
|
Date: Mon Aug 12 19:02:14 2024 +0200
|
|
|
|
openpgp: Do not accept non-matching key responses
|
|
|
|
When generating RSA key pair using PKCS#15 init, the driver could accept
|
|
responses relevant to ECC keys, which made further processing in the
|
|
pkcs15-init failing/accessing invalid parts of structures.
|
|
|
|
Thanks oss-fuzz!
|
|
|
|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=71010
|
|
|
|
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
|
|
|
Index: opensc-0.22.0/src/libopensc/card-openpgp.c
|
|
===================================================================
|
|
--- opensc-0.22.0.orig/src/libopensc/card-openpgp.c
|
|
+++ opensc-0.22.0/src/libopensc/card-openpgp.c
|
|
@@ -2657,14 +2657,21 @@ pgp_calculate_and_store_fingerprint(sc_c
|
|
/* update the blob containing fingerprints (00C5) */
|
|
sc_log(card->ctx, "Updating fingerprint blob 00C5.");
|
|
fpseq_blob = pgp_find_blob(card, 0x00C5);
|
|
- if (fpseq_blob == NULL)
|
|
- LOG_TEST_GOTO_ERR(card->ctx, SC_ERROR_OUT_OF_MEMORY, "Cannot find blob 00C5");
|
|
+ if (fpseq_blob == NULL) {
|
|
+ r = SC_ERROR_OUT_OF_MEMORY;
|
|
+ LOG_TEST_GOTO_ERR(card->ctx, r, "Cannot find blob 00C5");
|
|
+ }
|
|
+ if (20 * key_info->key_id > fpseq_blob->len) {
|
|
+ r = SC_ERROR_OBJECT_NOT_VALID;
|
|
+ LOG_TEST_GOTO_ERR(card->ctx, r, "The 00C5 blob is not large enough");
|
|
+ }
|
|
|
|
/* save the fingerprints sequence */
|
|
newdata = malloc(fpseq_blob->len);
|
|
- if (newdata == NULL)
|
|
- LOG_TEST_GOTO_ERR(card->ctx, SC_ERROR_OUT_OF_MEMORY,
|
|
- "Not enough memory to update fingerprint blob 00C5");
|
|
+ if (newdata == NULL) {
|
|
+ r = SC_ERROR_OUT_OF_MEMORY;
|
|
+ LOG_TEST_GOTO_ERR(card->ctx, r, "Not enough memory to update fingerprint blob 00C5");
|
|
+ }
|
|
|
|
memcpy(newdata, fpseq_blob->data, fpseq_blob->len);
|
|
/* move p to the portion holding the fingerprint of the current key */
|
|
@@ -2778,6 +2785,9 @@ pgp_parse_and_set_pubkey_output(sc_card_
|
|
|
|
/* RSA modulus */
|
|
if (tag == 0x0081) {
|
|
+ if (key_info->algorithm != SC_OPENPGP_KEYALGO_RSA) {
|
|
+ LOG_FUNC_RETURN(card->ctx, SC_ERROR_UNKNOWN_DATA_RECEIVED);
|
|
+ }
|
|
if ((BYTES4BITS(key_info->u.rsa.modulus_len) < len) /* modulus_len is in bits */
|
|
|| key_info->u.rsa.modulus == NULL) {
|
|
|
|
@@ -2793,6 +2803,9 @@ pgp_parse_and_set_pubkey_output(sc_card_
|
|
}
|
|
/* RSA public exponent */
|
|
else if (tag == 0x0082) {
|
|
+ if (key_info->algorithm != SC_OPENPGP_KEYALGO_RSA) {
|
|
+ LOG_FUNC_RETURN(card->ctx, SC_ERROR_UNKNOWN_DATA_RECEIVED);
|
|
+ }
|
|
if ((BYTES4BITS(key_info->u.rsa.exponent_len) < len) /* exponent_len is in bits */
|
|
|| key_info->u.rsa.exponent == NULL) {
|
|
|
|
@@ -2808,6 +2821,10 @@ pgp_parse_and_set_pubkey_output(sc_card_
|
|
}
|
|
/* ECC public key */
|
|
else if (tag == 0x0086) {
|
|
+ if (key_info->algorithm != SC_OPENPGP_KEYALGO_ECDSA &&
|
|
+ key_info->algorithm != SC_OPENPGP_KEYALGO_ECDH) {
|
|
+ LOG_FUNC_RETURN(card->ctx, SC_ERROR_UNKNOWN_DATA_RECEIVED);
|
|
+ }
|
|
/* set the output data */
|
|
/* len is ecpoint length + format byte
|
|
* see section 7.2.14 of 3.3.1 specs */
|