<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE3-SA-2025-0119</id>
    <title>An update for opensc is now available for HCE 3.0</title>
    <severity>Moderate</severity>
    <release>HCE 3.0</release>
    <issued date="2025-10-09 06:38:18"/>
    <updated date="2025-10-09 06:38:18"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-45616" id="CVE-2024-45616" title="CVE-2024-45616 Base Score: 3.9 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-45619" id="CVE-2024-45619" title="CVE-2024-45619 Base Score: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-45618" id="CVE-2024-45618" title="CVE-2024-45618 Base Score: 3.9 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-45617" id="CVE-2024-45617" title="CVE-2024-45617 Base Score: 3.9 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992" id="CVE-2023-5992" title="CVE-2023-5992 Base Score: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-45615" id="CVE-2024-45615" title="CVE-2024-45615 Base Score: 3.9 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-45620" id="CVE-2024-45620" title="CVE-2024-45620 Base Score: 3.9 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-8443" id="CVE-2024-8443" title="CVE-2024-8443 Base Score: 2.9 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

The following problems were caused by insufficient control of the response APDU buffer and its length when communicating with the card. (CVE-2024-45616)

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed. (CVE-2024-45619)

A vulnerability was found in pkcs15-init in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized. (CVE-2024-45618)

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized. (CVE-2024-45617)

A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data. (CVE-2023-5992)

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. 
The problem is missing  initialization of variables expected to be initialized (as arguments to other functions, etc.). (CVE-2024-45615)

A vulnerability was found in the pkcs15-init tool in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed. (CVE-2024-45620)

A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution. (CVE-2024-8443)
</description>
    <pkglist>
      <collection short="HCE 3.0" package="opensc">
        <name>HCE 3.0</name>
        <package arch="x86_64" name="opensc" version="0.23.0" release="7.hce3">
          <filename>opensc-0.23.0-7.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="opensc-help" version="0.23.0" release="7.hce3">
          <filename>opensc-help-0.23.0-7.hce3.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="opensc" version="0.23.0" release="7.hce3">
          <filename>opensc-0.23.0-7.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="opensc-help" version="0.23.0" release="7.hce3">
          <filename>opensc-help-0.23.0-7.hce3.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
