Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-5992

Опубликовано: 31 янв. 2024
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openscfixed0.25.0~rc1-1package
openscfixed0.23.0-0.3+deb12u2bookwormpackage
openscno-dsabusterpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2248685

  • https://github.com/OpenSC/OpenSC/wiki/CVE-2023-5992

  • https://github.com/OpenSC/OpenSC/security/advisories/GHSA-h6ww-xfc2-jw4h

  • https://github.com/OpenSC/OpenSC/pull/2948

  • Regression fix: https://github.com/OpenSC/OpenSC/pull/3077 (0.25.1)

EPSS

Процентиль: 48%
0.00244
Низкий

Связанные уязвимости

CVSS3: 5.6
ubuntu
больше 1 года назад

A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.

CVSS3: 5.6
redhat
больше 1 года назад

A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.

CVSS3: 5.6
nvd
больше 1 года назад

A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.

CVSS3: 5.9
msrc
около 1 года назад

Описание отсутствует

suse-cvrf
6 дней назад

Security update for opensc

EPSS

Процентиль: 48%
0.00244
Низкий