An update for opensc is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1063
Final
1.0
1.0
2021-03-05
Initial
2021-03-05
2021-03-05
openEuler SA Tool V1.0
2021-03-05
opensc security update
An update for opensc is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.
OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitate their use in security applications such as authentication, mail encryption and digital signatures. OpenSC implements the standard APIs to smart cards, e.g. PKCS#11 API, Windows’ Smart Card Minidriver and macOS Tokend.
Security Fix(es):
The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.(CVE-2020-26571)
The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.(CVE-2020-26572)
An update for opensc is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
opensc
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1063
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-26571
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-26572
https://nvd.nist.gov/vuln/detail/CVE-2020-26571
https://nvd.nist.gov/vuln/detail/CVE-2020-26572
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
opensc-0.20.0-6.oe1.aarch64.rpm
opensc-debuginfo-0.20.0-6.oe1.aarch64.rpm
opensc-debugsource-0.20.0-6.oe1.aarch64.rpm
opensc-0.20.0-6.oe1.aarch64.rpm
opensc-debuginfo-0.20.0-6.oe1.aarch64.rpm
opensc-debugsource-0.20.0-6.oe1.aarch64.rpm
opensc-help-0.20.0-6.oe1.noarch.rpm
opensc-help-0.20.0-6.oe1.noarch.rpm
opensc-0.20.0-6.oe1.src.rpm
opensc-0.20.0-6.oe1.src.rpm
opensc-0.20.0-6.oe1.x86_64.rpm
opensc-debugsource-0.20.0-6.oe1.x86_64.rpm
opensc-debuginfo-0.20.0-6.oe1.x86_64.rpm
opensc-0.20.0-6.oe1.x86_64.rpm
opensc-debugsource-0.20.0-6.oe1.x86_64.rpm
opensc-debuginfo-0.20.0-6.oe1.x86_64.rpm
The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.
2021-03-05
CVE-2020-26571
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Medium
5.5
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
opensc security update
2021-03-05
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1063
The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.
2021-03-05
CVE-2020-26572
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Medium
5.5
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
opensc security update
2021-03-05
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1063