An update for opensc is now available for openEuler-20.03-LTS-SP3 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1766 Final 1.0 1.0 2023-10-27 Initial 2023-10-27 2023-10-27 openEuler SA Tool V1.0 2023-10-27 opensc security update An update for opensc is now available for openEuler-20.03-LTS-SP3. OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitate their use in security applications such as authentication, mail encryption and digital signatures. OpenSC implements the standard APIs to smart cards, e.g. PKCS#11 API, Windows’ Smart Card Minidriver and macOS Tokend. Security Fix(es): VUL-0: CVE-2023-40660: opensc: PIN bypass when card tracks its own login state(CVE-2023-40660) An update for opensc is now available for openEuler-20.03-LTS-SP3. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium opensc https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1766 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-40660 https://nvd.nist.gov/vuln/detail/CVE-2023-40660 openEuler-20.03-LTS-SP3 opensc-0.20.0-12.oe1.aarch64.rpm opensc-debuginfo-0.20.0-12.oe1.aarch64.rpm opensc-debugsource-0.20.0-12.oe1.aarch64.rpm opensc-help-0.20.0-12.oe1.noarch.rpm opensc-0.20.0-12.oe1.src.rpm opensc-0.20.0-12.oe1.x86_64.rpm opensc-debugsource-0.20.0-12.oe1.x86_64.rpm opensc-debuginfo-0.20.0-12.oe1.x86_64.rpm VUL-0: CVE-2023-40660: opensc: PIN bypass when card tracks its own login state 2023-10-27 CVE-2023-40660 openEuler-20.03-LTS-SP3 Medium 6.3 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H opensc security update 2023-10-27 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1766