forked from pool/opensc
Compare commits
6 Commits
Author | SHA256 | Date | |
---|---|---|---|
|
c8f93af877 | ||
c25e6d53e6 | |||
|
839812f4ce | ||
|
a9f61c5855 | ||
|
3e963d6f45 | ||
24eb6f5b62 |
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:23cbaae8bd7c8eb589b68c0a961dfb0d02007bea3165a3fc5efe2621d549b37b
|
|
||||||
size 2395579
|
|
3
opensc-0.26.1.tar.gz
Normal file
3
opensc-0.26.1.tar.gz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:f16291a031d86e570394762e9f35eaf2fcbc2337a49910f3feae42d54e1688cb
|
||||||
|
size 2416935
|
120
opensc.changes
120
opensc.changes
@ -1,3 +1,123 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Jan 14 19:30:47 UTC 2025 - Martin Hauke <mardnh@gmx.de>
|
||||||
|
|
||||||
|
- Update to version 0.26.1
|
||||||
|
General improvements
|
||||||
|
* Align allocations of sc_mem_secure_alloc (#3281).
|
||||||
|
* Fix -O3 gcc optimization failure on amd64 and ppc64el (#3299).
|
||||||
|
pkcs11-spy
|
||||||
|
* Avoid crash while spying C_GetInterface() (#3275).
|
||||||
|
TCOS
|
||||||
|
* Fix reading certificate (#3296).
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Nov 14 19:35:35 UTC 2024 - Martin Hauke <mardnh@gmx.de>
|
||||||
|
|
||||||
|
- Update to version 0.26.0
|
||||||
|
Security
|
||||||
|
* CVE-2024-45615: Usage of uninitialized values in libopensc#
|
||||||
|
and pkcs15init (#3225).
|
||||||
|
* CVE-2024-45616: Uninitialized values after incorrect check or
|
||||||
|
usage of APDU response values in libopensc (#3225)
|
||||||
|
* CVE-2024-45617: Uninitialized values after incorrect or missing
|
||||||
|
checking return values of functions in libopensc (#3225)
|
||||||
|
* CVE-2024-45618: Uninitialized values after incorrect or missing
|
||||||
|
checking return values of functions in pkcs15init (#3225)
|
||||||
|
* CVE-2024-45619: Incorrect handling length of buffers or files
|
||||||
|
in libopensc (#3225)
|
||||||
|
* CVE-2024-45620: Incorrect handling of the length of buffers or
|
||||||
|
files in pkcs15init (#3225)
|
||||||
|
* CVE-2024-8443: Heap buffer overflow in OpenPGP driver when
|
||||||
|
generating key (#3219)
|
||||||
|
General improvements
|
||||||
|
* Fix reselection of DF after error in PKCS#15 layer (#3067)
|
||||||
|
* Unify OpenSSL logging throughout code (#2922)
|
||||||
|
* Extend the p11test to support kryoptic (#3141)
|
||||||
|
* Fix for error in PCSC reconnection (#3150)
|
||||||
|
* Fixed various issues reported by OSS-Fuzz and Coverity in
|
||||||
|
drivers, PKCS#11 and PKCS#15 layer
|
||||||
|
PKCS#15
|
||||||
|
* Documentation for PKCS#15 profile files (#3132)
|
||||||
|
minidriver
|
||||||
|
* Support PinCacheAlwaysPrompt usable for PIV cards (#3167)
|
||||||
|
pkcs11-tool
|
||||||
|
* Show URI when listing token information (#3125) and objects
|
||||||
|
* Do not limit size of objects to 5000 bytes (#3174)
|
||||||
|
* Add support for AES CMAC (#3184)
|
||||||
|
* Add support for AES GCM encryption (#3195)
|
||||||
|
* Add support for RSA OAEP encryption (#3175)
|
||||||
|
* Add support for HKDF (#3193)
|
||||||
|
* Implement better support for wrapping and unwrapping (#3198)
|
||||||
|
* Add support for EdDSA sign and verify (#2979)
|
||||||
|
pkcs15-crypt
|
||||||
|
* Fix PKCS#1 encoding function to correctly detect padding type
|
||||||
|
piv-tool
|
||||||
|
* Fix RSA key generation (#3158)
|
||||||
|
* Avoid possible state change when matching unknown card (#3112)
|
||||||
|
sc-hsm-tool
|
||||||
|
* Cleanse buffer with plaintext key share (#3226)
|
||||||
|
pkcs11-register
|
||||||
|
* Fix pkcs11-register defaults on macOS and Windows (#3053)
|
||||||
|
IDPrime
|
||||||
|
* Fix identification of IDPrime 840 cards (#3146)
|
||||||
|
* Fix container mapping for IDPrime 940 cards (#3220)
|
||||||
|
* Reorder ATRs for matching cards (#3154)
|
||||||
|
OpenPGP
|
||||||
|
* Fix state tracking after erasing card (#3024)
|
||||||
|
Belpic
|
||||||
|
* Disable Applet V1.8 (#3109)
|
||||||
|
MICARDO
|
||||||
|
* Deactivate driver (#3152)
|
||||||
|
SmartCard-HSM
|
||||||
|
* Fix signing with secp521r1 signature (#3157)
|
||||||
|
eOI
|
||||||
|
* Set model via sc_card_ctl function (#3189)
|
||||||
|
Rutoken
|
||||||
|
* increase the minimum PIN size to support Rutoken ECP BIO.
|
||||||
|
JPKI
|
||||||
|
* Adjust parameters for public key in PKCS#15 emulator (#3182)
|
||||||
|
D-Trust
|
||||||
|
* Add support for ECDSA signatures and ECDH key agreement for
|
||||||
|
D-Trust Signatures Cards 4.1/4.4 (#3240, #3248)
|
||||||
|
- Drop patches (changes now in upstream):
|
||||||
|
* opensc-CVE-2024-45615.patch
|
||||||
|
* opensc-CVE-2024-45616.patch
|
||||||
|
* opensc-CVE-2024-45617.patch
|
||||||
|
* opensc-CVE-2024-45618.patch
|
||||||
|
* opensc-CVE-2024-45619.patch
|
||||||
|
* opensc-CVE-2024-45620.patch
|
||||||
|
* opensc-CVE-2024-8443.patch
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Oct 1 06:30:06 UTC 2024 - Angel Yankov <angel.yankov@suse.com>
|
||||||
|
|
||||||
|
- - Security fix: [CVE-2024-8443, bsc#1230364]
|
||||||
|
* opensc: heap buffer overflow in OpenPGP driver when generating key
|
||||||
|
* Added patch: opensc-CVE-2024-8443.patch
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Oct 1 06:27:05 UTC 2024 - Angel Yankov <angel.yankov@suse.com>
|
||||||
|
|
||||||
|
- Security fix: [opensc-CVE-2024-45620, bsc#1230076]
|
||||||
|
- Security fix: [opensc-CVE-2024-45619, bsc#1230075]
|
||||||
|
- Security fix: [opensc-CVE-2024-45618, bsc#1230074]
|
||||||
|
- Security fix: [opensc-CVE-2024-45617, bsc#1230073]
|
||||||
|
- Security fix: [opensc-CVE-2024-45616, bsc#1230072]
|
||||||
|
- Security fix: [opensc-CVE-2024-45615, bsc#1230071]
|
||||||
|
* opensc: pkcs15init: Usage of uninitialized values in libopensc and pkcs15init
|
||||||
|
* opensc: Uninitialized values after incorrect check or usage of APDU response values in libopensc
|
||||||
|
* opensc: Uninitialized values after incorrect or missing checking return values of functions in libopensc
|
||||||
|
* opensc: Uninitialized values after incorrect or missing checking return values of functions in pkcs15init
|
||||||
|
* opensc: Incorrect handling length of buffers or files in libopensc
|
||||||
|
* opensc: Incorrect handling of the length of buffers or files in pkcs15init
|
||||||
|
* Added patches:
|
||||||
|
- opensc-CVE-2024-45615.patch
|
||||||
|
- opensc-CVE-2024-45616.patch
|
||||||
|
- opensc-CVE-2024-45617.patch
|
||||||
|
- opensc-CVE-2024-45618.patch
|
||||||
|
- opensc-CVE-2024-45619.patch
|
||||||
|
- opensc-CVE-2024-45620.patch
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Apr 5 18:54:38 UTC 2024 - Martin Hauke <mardnh@gmx.de>
|
Fri Apr 5 18:54:38 UTC 2024 - Martin Hauke <mardnh@gmx.de>
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# spec file for package opensc
|
# spec file for package opensc
|
||||||
#
|
#
|
||||||
# Copyright (c) 2024 SUSE LLC
|
# Copyright (c) 2025 SUSE LLC
|
||||||
#
|
#
|
||||||
# All modifications and additions to the file contributed by third parties
|
# All modifications and additions to the file contributed by third parties
|
||||||
# remain the property of their copyright owners, unless otherwise agreed
|
# remain the property of their copyright owners, unless otherwise agreed
|
||||||
@ -16,10 +16,10 @@
|
|||||||
#
|
#
|
||||||
|
|
||||||
|
|
||||||
%define sover 11
|
%define sover 12
|
||||||
%define completionsdir %(pkg-config --variable completionsdir bash-completion)
|
%define completionsdir %(pkg-config --variable completionsdir bash-completion)
|
||||||
Name: opensc
|
Name: opensc
|
||||||
Version: 0.25.1
|
Version: 0.26.1
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Smart Card Utilities
|
Summary: Smart Card Utilities
|
||||||
License: LGPL-2.1-or-later
|
License: LGPL-2.1-or-later
|
||||||
|
Loading…
Reference in New Issue
Block a user