Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2023:4065-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2023/suse-su-20234065-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4065-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2023:4065-1
Related
CVE-2021-42782
CVE-2023-40661
Published
2023-10-12T11:26:06Z
Modified
2023-10-12T11:26:06Z
Summary
Security update for opensc
Details
This update for opensc fixes the following issues:
CVE-2021-42782: Fixed several stack buffer overflows (bsc#1191957).
CVE-2023-40661: Fixed several memory safety issues that could happen during the card enrollment process using pkcs15-init (bsc#1215761).
References
https://www.suse.com/support/update/announcement/2023/suse-su-20234065-1/
https://bugzilla.suse.com/1191957
https://bugzilla.suse.com/1215761
https://www.suse.com/security/cve/CVE-2021-42782
https://www.suse.com/security/cve/CVE-2023-40661
Affected packages
SUSE:Linux Enterprise Server 12 SP5
/
opensc
Package
Name
opensc
Purl
pkg:rpm/suse/opensc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0.13.0-3.25.1
Ecosystem specific
{ "binaries": [ { "opensc": "0.13.0-3.25.1" } ] }
SUSE:Linux Enterprise Server for SAP Applications 12 SP5
/
opensc
Package
Name
opensc
Purl
pkg:rpm/suse/opensc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0.13.0-3.25.1
Ecosystem specific
{ "binaries": [ { "opensc": "0.13.0-3.25.1" } ] }
SUSE-SU-2023:4065-1 - OSV