An update for opensc is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1063 Final 1.0 1.0 2021-03-05 Initial 2021-03-05 2021-03-05 openEuler SA Tool V1.0 2021-03-05 opensc security update An update for opensc is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1. OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitate their use in security applications such as authentication, mail encryption and digital signatures. OpenSC implements the standard APIs to smart cards, e.g. PKCS#11 API, Windows’ Smart Card Minidriver and macOS Tokend. Security Fix(es): The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.(CVE-2020-26571) The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.(CVE-2020-26572) An update for opensc is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium opensc https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1063 https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-26571 https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-26572 https://nvd.nist.gov/vuln/detail/CVE-2020-26571 https://nvd.nist.gov/vuln/detail/CVE-2020-26572 openEuler-20.03-LTS openEuler-20.03-LTS-SP1 opensc-0.20.0-6.oe1.aarch64.rpm opensc-debuginfo-0.20.0-6.oe1.aarch64.rpm opensc-debugsource-0.20.0-6.oe1.aarch64.rpm opensc-0.20.0-6.oe1.aarch64.rpm opensc-debuginfo-0.20.0-6.oe1.aarch64.rpm opensc-debugsource-0.20.0-6.oe1.aarch64.rpm opensc-help-0.20.0-6.oe1.noarch.rpm opensc-help-0.20.0-6.oe1.noarch.rpm opensc-0.20.0-6.oe1.src.rpm opensc-0.20.0-6.oe1.src.rpm opensc-0.20.0-6.oe1.x86_64.rpm opensc-debugsource-0.20.0-6.oe1.x86_64.rpm opensc-debuginfo-0.20.0-6.oe1.x86_64.rpm opensc-0.20.0-6.oe1.x86_64.rpm opensc-debugsource-0.20.0-6.oe1.x86_64.rpm opensc-debuginfo-0.20.0-6.oe1.x86_64.rpm The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init. 2021-03-05 CVE-2020-26571 openEuler-20.03-LTS openEuler-20.03-LTS-SP1 Medium 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H opensc security update 2021-03-05 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1063 The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher. 2021-03-05 CVE-2020-26572 openEuler-20.03-LTS openEuler-20.03-LTS-SP1 Medium 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H opensc security update 2021-03-05 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1063