Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU66142
Risk: Low
CVSSv3.1: 1.8 [CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42779
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows an attacker with physical access to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in Opensc in sc_file_valid. An attacker with physical access can trigger use-after-free to perform a denial of service attack.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Realtime Extension: 15-SP2
SUSE Linux Enterprise Server: 15-SP1-BCL - 15-SP3-LTSS
SUSE Linux Enterprise High Performance Computing: 15-SP1-ESPOS - 15-SP3-LTSS
SUSE Linux Enterprise Desktop: 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Micro: 5.1
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Basesystem: 15-SP3
opensc-32bit-debuginfo: before 0.19.0-150100.3.16.1
opensc-32bit: before 0.19.0-150100.3.16.1
opensc-debugsource: before 0.19.0-150100.3.16.1
opensc-debuginfo: before 0.19.0-150100.3.16.1
opensc: before 0.19.0-150100.3.16.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20221156-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66136
Risk: Low
CVSSv3.1: 2.1 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42780
CWE-ID:
CWE-252 - Unchecked Return Value
Exploit availability: No
DescriptionThe vulnerability allows an attacker with physical access to perform denial of service attacks.
The vulnerability exists due to use after return issue in insert_pin() function in Opensc. An attacker with physical access can trigger the vulnerability to perform denial of service attacks.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Realtime Extension: 15-SP2
SUSE Linux Enterprise Server: 15-SP1-BCL - 15-SP3-LTSS
SUSE Linux Enterprise High Performance Computing: 15-SP1-ESPOS - 15-SP3-LTSS
SUSE Linux Enterprise Desktop: 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Micro: 5.1
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Basesystem: 15-SP3
opensc-32bit-debuginfo: before 0.19.0-150100.3.16.1
opensc-32bit: before 0.19.0-150100.3.16.1
opensc-debugsource: before 0.19.0-150100.3.16.1
opensc-debuginfo: before 0.19.0-150100.3.16.1
opensc: before 0.19.0-150100.3.16.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20221156-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66141
Risk: Low
CVSSv3.1: 1.8 [CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42781
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows an attacker with physical access to perform denial of service attack.
The vulnerability exists due to a boundary error in Opensc before in pkcs15-oberthur.c. An attacker with physical access can pass specially crafted data to the application, trigger a heap-based buffer overflow and perform denial of service attack.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Realtime Extension: 15-SP2
SUSE Linux Enterprise Server: 15-SP1-BCL - 15-SP3-LTSS
SUSE Linux Enterprise High Performance Computing: 15-SP1-ESPOS - 15-SP3-LTSS
SUSE Linux Enterprise Desktop: 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Micro: 5.1
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Basesystem: 15-SP3
opensc-32bit-debuginfo: before 0.19.0-150100.3.16.1
opensc-32bit: before 0.19.0-150100.3.16.1
opensc-debugsource: before 0.19.0-150100.3.16.1
opensc-debuginfo: before 0.19.0-150100.3.16.1
opensc: before 0.19.0-150100.3.16.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20221156-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66137
Risk: Low
CVSSv3.1: 2.1 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42782
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows an attacker with physical access to perform a denial of service attack.
The vulnerability exists due to a boundary error in Opensc in various places. An attacker with physical access can trigger stack-based buffer overflow and perform a denial of service attack.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Realtime Extension: 15-SP2
SUSE Linux Enterprise Server: 15-SP1-BCL - 15-SP3-LTSS
SUSE Linux Enterprise High Performance Computing: 15-SP1-ESPOS - 15-SP3-LTSS
SUSE Linux Enterprise Desktop: 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Micro: 5.1
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Module for Basesystem: 15-SP3
opensc-32bit-debuginfo: before 0.19.0-150100.3.16.1
opensc-32bit: before 0.19.0-150100.3.16.1
opensc-debugsource: before 0.19.0-150100.3.16.1
opensc-debuginfo: before 0.19.0-150100.3.16.1
opensc: before 0.19.0-150100.3.16.1
External linkshttp://www.suse.com/support/update/announcement/2022/suse-su-20221156-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.