Home

Description

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. The following problems were caused by insufficient control of the response APDU buffer and its length when communicating with the card.

PUBLISHED Reserved 2024-09-02 | Published 2024-09-03 | Updated 2025-11-07 | Assigner redhat




LOW: 3.9CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Problem types

Use of Uninitialized Variable

Product status

Default status
unaffected

Any version before 0.26.0
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2024-09-02:Reported to Red Hat.
2024-09-02:Made public.

Credits

Red Hat would like to thank Matteo Marini (Sapienza University of Rome) for reporting this issue.

References

lists.debian.org/debian-lts-announce/2024/12/msg00026.html

access.redhat.com/security/cve/CVE-2024-45616 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2309290 (RHBZ#2309290) issue-tracking

cve.org (CVE-2024-45616)

nvd.nist.gov (CVE-2024-45616)

Download JSON