An update for opensc is now available for openEuler-20.03-LTS-SP3
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1766
Final
1.0
1.0
2023-10-27
Initial
2023-10-27
2023-10-27
openEuler SA Tool V1.0
2023-10-27
opensc security update
An update for opensc is now available for openEuler-20.03-LTS-SP3.
OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitate their use in security applications such as authentication, mail encryption and digital signatures. OpenSC implements the standard APIs to smart cards, e.g. PKCS#11 API, Windows’ Smart Card Minidriver and macOS Tokend.
Security Fix(es):
VUL-0: CVE-2023-40660: opensc: PIN bypass when card tracks its own login state(CVE-2023-40660)
An update for opensc is now available for openEuler-20.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
opensc
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1766
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-40660
https://nvd.nist.gov/vuln/detail/CVE-2023-40660
openEuler-20.03-LTS-SP3
opensc-0.20.0-12.oe1.aarch64.rpm
opensc-debuginfo-0.20.0-12.oe1.aarch64.rpm
opensc-debugsource-0.20.0-12.oe1.aarch64.rpm
opensc-help-0.20.0-12.oe1.noarch.rpm
opensc-0.20.0-12.oe1.src.rpm
opensc-0.20.0-12.oe1.x86_64.rpm
opensc-debugsource-0.20.0-12.oe1.x86_64.rpm
opensc-debuginfo-0.20.0-12.oe1.x86_64.rpm
VUL-0: CVE-2023-40660: opensc: PIN bypass when card tracks its own login state
2023-10-27
CVE-2023-40660
openEuler-20.03-LTS-SP3
Medium
6.3
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
opensc security update
2023-10-27
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1766