Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Towards new release 0.25.0 #3017

Closed
xhanulik opened this issue Feb 6, 2024 · 8 comments
Closed

Towards new release 0.25.0 #3017

xhanulik opened this issue Feb 6, 2024 · 8 comments

Comments

@xhanulik
Copy link
Contributor

xhanulik commented Feb 6, 2024

Here is the draft release notes for the upcoming release, feel free to adjust or let me know what is missing. Some of the project cards in https://github.com/OpenSC/OpenSC/projects/13 are still in progress, so I will adjust the draft eventually.


Security

General improvements

minidriver

pkcs11-tool

IDPrime

D-Trust Signature Cards

EstEID

ePass2003

SmartCard-HSM

MyEID

Rutoken

@xhanulik
Copy link
Contributor Author

xhanulik commented Feb 7, 2024

Regarding the security relevant bugs reported by OSS-Fuzz, there are two issues

but they are both fixing previously reported and fixed fuzzing issues .

From Coverity high impact issues, there are only problems connected to unit tests for PKCS#1 v1.5 depadding, fixed by #3016.

@frankmorgner
Copy link
Member

Thanks for the summary, looks good so far!

Regarding the security relevant bugs reported by OSS-Fuzz, there are two issues

* https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=65684
  
  * fixed with [c354501](https://github.com/OpenSC/OpenSC/commit/c3545018d059b4debde33b9f34de719dd41e5531)

If I understand correctly, then the original issue was a loss of memory. Since the use after free was not part of any release version, I'd rather fall back to the severity of the old issue (loss of memory, not security relevant)

* https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898
  
  * fixed with [5835f0d](https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9)

This one seems noteworthy for the upcoming release, because the 6d1fcd9 was part of 0.24.0. However, it can only be triggered by a malicious card and during modification of the card. If we want to allocate a CVE for this, we could use the description of CVE-2023-40661 as template.

@alt3r-3go
Copy link
Contributor

I'd like to contribute to this release (and hopefully future ones!) by testing it with my Nitrokey Start and Pro tokens and updating the Release Testing wiki page accordingly. Hopefully that's useful :)

I have a quick question though - I don't see any tags for 0.25 yet, should I wait for one, or just go ahead with a build off of master? Both tokens are OpenPGP, so based on the list above all the changes potentially touching that part are already in (as far as I understand, anyway - please let me know if I'm missing anything), but I wonder if I'd better wait for the "official" tag so that the test is more relevant.

@frankmorgner
Copy link
Member

Hi, @alt3r-3go , great to hear! We will update the table once we have created a release candidate. When that is done, you can extend the wiki (and the test result page) by making a pull request here https://github.com/OpenSC/Wiki

@Jakuje
Copy link
Member

Jakuje commented Feb 12, 2024

This one seems noteworthy for the upcoming release, because the 6d1fcd9 was part of 0.24.0.

The UAF could happen only, when the sc_get_challenge() would return value 0 / SC_SUCCESS, which would get through the condition if (!rv) {, but not through the condition if (_ret < 0) { to return.

So I agree that it would make sense to get the CVE for this (with low priority as it only affects the enrollment).

@xhanulik
Copy link
Contributor Author

This one seems noteworthy for the upcoming release, because the 6d1fcd9 was part of 0.24.0. However, it can only be triggered by a malicious card and during modification of the card. If we want to allocate a CVE for this, we could use the description of CVE-2023-40661 as template.

Here is the draft of the CVE:

Memory use after free in AuthentIC driver when updating token info

The Use After Free vulnerability was identified within the AuthentIC driver in OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls or modifies cards. An attacker must have physical access to the computer system to take advantage of this flaw. The attack requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can potentially allow for compromising card management operations during enrollment.

References

@frankmorgner
Copy link
Member

please also pick up the code signing of the Windows installer in the changelog (#2799)

@xhanulik xhanulik mentioned this issue Feb 15, 2024
5 tasks
@xhanulik
Copy link
Contributor Author

The release candidate 1 is out now https://github.com/OpenSC/OpenSC/releases/tag/0.25.0-rc1.

We would appreciate further testing of rc1 (https://github.com/OpenSC/OpenSC/wiki/Smart-Card-Release-Testing); results can be added as PR to https://github.com/OpenSC/Wiki or shared as a comment on this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants