SUSE SLED15 / SLES15 / openSUSE 15 Security Update : opensc (SUSE-SU-2024:3444-1)

medium Nessus Plugin ID 207782

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3444-1 advisory.

- CVE-2024-45620: Incorrect handling of the length of buffers or files in pkcs15init. (bsc#1230076)
- CVE-2024-45619: Incorrect handling length of buffers or files in libopensc. (bsc#1230075)
- CVE-2024-45618: Uninitialized values after incorrect or missing checking return values of functions in pkcs15init. (bsc#1230074)
- CVE-2024-45617: Uninitialized values after incorrect or missing checking return values of functions in libopensc. (bsc#1230073)
- CVE-2024-45616: Uninitialized values after incorrect check or usage of APDU response values in libopensc. (bsc#1230072)
- CVE-2024-45615: Usage of uninitialized values in libopensc and pkcs15init. (bsc#1230071)
- CVE-2024-8443: Heap buffer overflow in OpenPGP driver when generating key. (bsc#1230364)

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected opensc and / or opensc-32bit packages.

See Also

https://bugzilla.suse.com/1217722

https://bugzilla.suse.com/1230071

https://bugzilla.suse.com/1230072

https://bugzilla.suse.com/1230073

https://bugzilla.suse.com/1230074

https://bugzilla.suse.com/1230075

https://bugzilla.suse.com/1230076

https://bugzilla.suse.com/1230364

http://www.nessus.org/u?0cb757f2

https://www.suse.com/security/cve/CVE-2024-45615

https://www.suse.com/security/cve/CVE-2024-45616

https://www.suse.com/security/cve/CVE-2024-45617

https://www.suse.com/security/cve/CVE-2024-45618

https://www.suse.com/security/cve/CVE-2024-45619

https://www.suse.com/security/cve/CVE-2024-45620

https://www.suse.com/security/cve/CVE-2024-8443

Plugin Details

Severity: Medium

ID: 207782

File Name: suse_SU-2024-3444-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/26/2024

Updated: 9/26/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2024-45619

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:opensc

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/25/2024

Vulnerability Publication Date: 9/3/2024

Reference Information

CVE: CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618, CVE-2024-45619, CVE-2024-45620, CVE-2024-8443

SuSE: SUSE-SU-2024:3444-1