Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:4104-1

Опубликовано: 17 окт. 2023
Источник: suse-cvrf

Описание

Security update for opensc

This update for opensc fixes the following issues:

  • CVE-2023-40660: Fixed a PIN bypass that could be triggered when cards tracked their own login state (bsc#1215762).
  • CVE-2023-40661: Fixed several memory safety issues that could happen during the card enrollment process using pkcs15-init (bsc#1215761).

Список пакетов

SUSE Enterprise Storage 7.1
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise Micro 5.1
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise Micro 5.2
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise Server 15 SP1-LTSS
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise Server 15 SP2-LTSS
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise Server 15 SP3-LTSS
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3
opensc-0.19.0-150100.3.25.1
SUSE Manager Proxy 4.2
opensc-0.19.0-150100.3.25.1
SUSE Manager Server 4.2
opensc-0.19.0-150100.3.25.1

Описание

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.


Затронутые продукты
SUSE Enterprise Storage 7.1:opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:opensc-0.19.0-150100.3.25.1

Ссылки

Описание

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.


Затронутые продукты
SUSE Enterprise Storage 7.1:opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:opensc-0.19.0-150100.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:opensc-0.19.0-150100.3.25.1

Ссылки