Your message dated Wed, 08 Nov 2023 00:49:21 +0000
with message-id <e1r0wkz-001cnd...@fasolo.debian.org>
and subject line Bug#1055521: fixed in opensc 0.23.0-2
has caused the Debian Bug report #1055521,
regarding opensc: CVE-2023-40660
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1055521: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055521
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: opensc
Version: 0.23.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for opensc.

CVE-2023-40660[0]:
| A flaw was found in OpenSC packages that allow a potential PIN
| bypass. When a token/card is authenticated by one process, it can
| perform cryptographic operations in other processes when an empty
| zero-length pin is passed. This issue poses a security risk,
| particularly for OS logon/screen unlock and for small, permanently
| connected tokens to computers. Additionally, the token can
| internally track login status. This flaw allows an attacker to gain
| unauthorized access, carry out malicious actions, or compromise the
| system without the user's awareness.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-40660
    https://www.cve.org/CVERecord?id=CVE-2023-40660
[1] https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651
[2] https://github.com/OpenSC/OpenSC/wiki/CVE-2023-40660
[3] 
https://github.com/OpenSC/OpenSC/commit/868f76fb31255fd3fdacfc3e476452efeb61c3e7

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: opensc
Source-Version: 0.23.0-2
Done: Bastian Germann <b...@debian.org>

We believe that the bug you reported is fixed in the latest version of
opensc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1055...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Germann <b...@debian.org> (supplier of updated opensc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 08 Nov 2023 01:26:46 +0100
Source: opensc
Architecture: source
Version: 0.23.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSC Maintainers <pkg-opensc-ma...@lists.alioth.debian.org>
Changed-By: Bastian Germann <b...@debian.org>
Closes: 1055520 1055521 1055522
Changes:
 opensc (0.23.0-2) unstable; urgency=medium
 .
   * Team upload
   * Fix CVE-2023-4535 with two upstream patches (Closes: #1055520)
   * Fix CVE-2023-40660 with upstream patch (Closes: #1055521)
   * Fix CVE-2023-40661 with upstream patches (Closes: #1055522)
Checksums-Sha1:
 76c468d9c8e9d443f92e98aaf01e0585101294c9 2012 opensc_0.23.0-2.dsc
 e5ddbe948317d4b8cd70d1f6430be93cb6400a7a 23572 opensc_0.23.0-2.debian.tar.xz
 23d1b794b5e9014ae1cff6c59da6897c31219fea 6929 opensc_0.23.0-2_source.buildinfo
Checksums-Sha256:
 350ec0f21a00a6ff83b822ee4911c88f559b101a22cfd2876c3cf2406e86be9f 2012 
opensc_0.23.0-2.dsc
 a9f8020f176a8df5005348de9db71786c2f20da65b6166168dbe1bd75eef56a3 23572 
opensc_0.23.0-2.debian.tar.xz
 ef54460b4e0498e269daf9daf1029ed2674f91642fcd71b6863297b745afcaf3 6929 
opensc_0.23.0-2_source.buildinfo
Files:
 4a492105a5443a6d672d500a83eb7939 2012 utils optional opensc_0.23.0-2.dsc
 5ed855e8f6cfd17c045a97a3902da186 23572 utils optional 
opensc_0.23.0-2.debian.tar.xz
 16012c5b6a48c472bdfaf249f2b9f8bd 6929 utils optional 
opensc_0.23.0-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=2Pb7
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to