OESA-2023-1767

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1767
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1767.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1767
Upstream
Published
2023-10-27T11:06:10Z
Modified
2025-08-12T05:22:07.172485Z
Summary
opensc security update
Details

OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitate their use in security applications such as authentication, mail encryption and digital signatures. OpenSC implements the standard APIs to smart cards, e.g. PKCS#11 API, Windows’ Smart Card Minidriver and macOS Tokend.

Security Fix(es):

VUL-0: CVE-2023-40660: opensc: PIN bypass when card tracks its own login state(CVE-2023-40660)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:22.03-LTS-SP2 / opensc

Package

Name
opensc
Purl
pkg:rpm/openEuler/opensc&distro=openEuler-22.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.21.0-8.oe2203sp2

Ecosystem specific

{
    "x86_64": [
        "opensc-debuginfo-0.21.0-8.oe2203sp2.x86_64.rpm",
        "opensc-debugsource-0.21.0-8.oe2203sp2.x86_64.rpm",
        "opensc-0.21.0-8.oe2203sp2.x86_64.rpm"
    ],
    "src": [
        "opensc-0.21.0-8.oe2203sp2.src.rpm"
    ],
    "aarch64": [
        "opensc-0.21.0-8.oe2203sp2.aarch64.rpm",
        "opensc-debuginfo-0.21.0-8.oe2203sp2.aarch64.rpm",
        "opensc-debugsource-0.21.0-8.oe2203sp2.aarch64.rpm"
    ],
    "noarch": [
        "opensc-help-0.21.0-8.oe2203sp2.noarch.rpm"
    ]
}