Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:4089-1

Опубликовано: 16 окт. 2023
Источник: suse-cvrf

Описание

Security update for opensc

This update for opensc fixes the following issues:

  • CVE-2023-40660: Fixed a PIN bypass that could be triggered when cards tracked their own login state (bsc#1215762).
  • CVE-2023-40661: Fixed several memory safety issues that could happen during the card enrollment process using pkcs15-init (bsc#1215761).

Список пакетов

Image SLES15-SP4-Hardened-BYOS
opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-Hardened-BYOS-Azure
opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-Hardened-BYOS-EC2
opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-Hardened-BYOS-GCE
opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-SAP-Hardened
opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-SAP-Hardened-Azure
opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-SAP-Hardened-BYOS
opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-SAP-Hardened-GCE
opensc-0.22.0-150400.3.6.1
Image SLES15-SP5-Hardened-BYOS-Azure
opensc-0.22.0-150400.3.6.1
Image SLES15-SP5-Hardened-BYOS-EC2
opensc-0.22.0-150400.3.6.1
Image SLES15-SP5-Hardened-BYOS-GCE
opensc-0.22.0-150400.3.6.1
Image SLES15-SP5-SAP-Hardened-Azure
opensc-0.22.0-150400.3.6.1
Image SLES15-SP5-SAP-Hardened-BYOS-Azure
opensc-0.22.0-150400.3.6.1
Image SLES15-SP5-SAP-Hardened-BYOS-EC2
opensc-0.22.0-150400.3.6.1
Image SLES15-SP5-SAP-Hardened-BYOS-GCE
opensc-0.22.0-150400.3.6.1
Image SLES15-SP5-SAP-Hardened-GCE
opensc-0.22.0-150400.3.6.1
SUSE Linux Enterprise Micro 5.3
opensc-0.22.0-150400.3.6.1
SUSE Linux Enterprise Micro 5.4
opensc-0.22.0-150400.3.6.1
SUSE Linux Enterprise Micro 5.5
opensc-0.22.0-150400.3.6.1
SUSE Linux Enterprise Module for Basesystem 15 SP4
opensc-0.22.0-150400.3.6.1
SUSE Linux Enterprise Module for Basesystem 15 SP5
opensc-0.22.0-150400.3.6.1

Описание

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.


Затронутые продукты
Image SLES15-SP4-Hardened-BYOS-Azure:opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-Hardened-BYOS-EC2:opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-Hardened-BYOS-GCE:opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-Hardened-BYOS:opensc-0.22.0-150400.3.6.1

Ссылки

Описание

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.


Затронутые продукты
Image SLES15-SP4-Hardened-BYOS-Azure:opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-Hardened-BYOS-EC2:opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-Hardened-BYOS-GCE:opensc-0.22.0-150400.3.6.1
Image SLES15-SP4-Hardened-BYOS:opensc-0.22.0-150400.3.6.1

Ссылки