A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2024-8443 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2310494 | Issue Tracking Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2024/12/msg00026.html |
Configurations
History
03 Nov 2025, 23:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
26 Sep 2024, 14:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2024-8443 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2310494 - Issue Tracking, Vendor Advisory | |
| Summary |
|
|
| CWE | CWE-787 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 2.9 |
| First Time |
Opensc Project opensc
Redhat Redhat enterprise Linux Opensc Project |
|
| CPE | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:opensc_project:opensc:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
10 Sep 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-09-10 14:15
Updated : 2025-11-03 23:17
NVD link : CVE-2024-8443
Mitre link : CVE-2024-8443
CVE.ORG link : CVE-2024-8443
JSON object : View
Products Affected
opensc_project
- opensc
redhat
- enterprise_linux
