<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for opensc is now available for openEuler-22.03-LTS-SP1,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2024-2245</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2024-10-12</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2024-10-12</InitialReleaseDate>
		<CurrentReleaseDate>2024-10-12</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2024-10-12</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">opensc security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for opensc is now available for openEuler-22.03-LTS-SP1,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitate their use in security applications such as authentication, mail encryption and digital signatures. OpenSC implements the standard APIs to smart cards, e.g. PKCS#11 API, Windows’ Smart Card Minidriver and macOS Tokend.

Security Fix(es):

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. 
The problem is missing  initialization of variables expected to be initialized (as arguments to other functions, etc.).(CVE-2024-45615)

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

The following problems were caused by insufficient control of the response APDU buffer and its length when communicating with the card.(CVE-2024-45616)

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized.(CVE-2024-45617)

A vulnerability was found in pkcs15-init in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized.(CVE-2024-45618)

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.(CVE-2024-45619)

A vulnerability was found in the pkcs15-init tool in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.(CVE-2024-45620)

A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution.(CVE-2024-8443)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for opensc is now available for openEuler-22.03-LTS-SP1,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of low. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Low</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">opensc</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2245</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45615</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45616</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45617</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45618</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45619</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45620</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-8443</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45615</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45616</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45617</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45618</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45619</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45620</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-8443</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="opensc-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">opensc-0.21.0-11.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debuginfo-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">opensc-debuginfo-0.21.0-11.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debugsource-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">opensc-debugsource-0.21.0-11.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.23.0-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">opensc-0.23.0-7.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debuginfo-0.23.0-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">opensc-debuginfo-0.23.0-7.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debugsource-0.23.0-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">opensc-debugsource-0.23.0-7.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-help-0.23.0-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">opensc-help-0.23.0-7.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">opensc-0.21.0-11.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debuginfo-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">opensc-debuginfo-0.21.0-11.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debugsource-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">opensc-debugsource-0.21.0-11.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">opensc-0.21.0-11.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debuginfo-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">opensc-debuginfo-0.21.0-11.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debugsource-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">opensc-debugsource-0.21.0-11.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.20.0-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">opensc-0.20.0-15.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debuginfo-0.20.0-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">opensc-debuginfo-0.20.0-15.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debugsource-0.20.0-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">opensc-debugsource-0.20.0-15.oe2003sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="opensc-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">opensc-0.21.0-11.oe2203sp1.src.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.23.0-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">opensc-0.23.0-7.oe2403.src.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">opensc-0.21.0-11.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">opensc-0.21.0-11.oe2203sp3.src.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.20.0-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">opensc-0.20.0-15.oe2003sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="opensc-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">opensc-0.21.0-11.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debuginfo-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">opensc-debuginfo-0.21.0-11.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debugsource-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">opensc-debugsource-0.21.0-11.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.23.0-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">opensc-0.23.0-7.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debuginfo-0.23.0-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">opensc-debuginfo-0.23.0-7.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debugsource-0.23.0-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">opensc-debugsource-0.23.0-7.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-help-0.23.0-7" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">opensc-help-0.23.0-7.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">opensc-0.21.0-11.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debuginfo-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">opensc-debuginfo-0.21.0-11.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debugsource-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">opensc-debugsource-0.21.0-11.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">opensc-0.21.0-11.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debuginfo-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">opensc-debuginfo-0.21.0-11.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debugsource-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">opensc-debugsource-0.21.0-11.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-0.20.0-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">opensc-0.20.0-15.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debuginfo-0.20.0-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">opensc-debuginfo-0.20.0-15.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="opensc-debugsource-0.20.0-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">opensc-debugsource-0.20.0-15.oe2003sp4.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="opensc-help-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">opensc-help-0.21.0-11.oe2203sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="opensc-help-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">opensc-help-0.21.0-11.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="opensc-help-0.21.0-11" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">opensc-help-0.21.0-11.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="opensc-help-0.20.0-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">opensc-help-0.20.0-15.oe2003sp4.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. The problem is missing  initialization of variables expected to be initialized (as arguments to other functions, etc.).</Note>
		</Notes>
		<ReleaseDate>2024-10-12</ReleaseDate>
		<CVE>CVE-2024-45615</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.9</BaseScore>
				<Vector>AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>opensc security update</Description>
				<DATE>2024-10-12</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2245</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. The following problems were caused by insufficient control of the response APDU buffer and its length when communicating with the card.</Note>
		</Notes>
		<ReleaseDate>2024-10-12</ReleaseDate>
		<CVE>CVE-2024-45616</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.9</BaseScore>
				<Vector>AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>opensc security update</Description>
				<DATE>2024-10-12</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2245</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized.</Note>
		</Notes>
		<ReleaseDate>2024-10-12</ReleaseDate>
		<CVE>CVE-2024-45617</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.9</BaseScore>
				<Vector>AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>opensc security update</Description>
				<DATE>2024-10-12</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2245</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in pkcs15-init in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized.</Note>
		</Notes>
		<ReleaseDate>2024-10-12</ReleaseDate>
		<CVE>CVE-2024-45618</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.9</BaseScore>
				<Vector>AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>opensc security update</Description>
				<DATE>2024-10-12</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2245</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.</Note>
		</Notes>
		<ReleaseDate>2024-10-12</ReleaseDate>
		<CVE>CVE-2024-45619</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.9</BaseScore>
				<Vector>AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>opensc security update</Description>
				<DATE>2024-10-12</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2245</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in the pkcs15-init tool in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.</Note>
		</Notes>
		<ReleaseDate>2024-10-12</ReleaseDate>
		<CVE>CVE-2024-45620</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.9</BaseScore>
				<Vector>AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>opensc security update</Description>
				<DATE>2024-10-12</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2245</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution.</Note>
		</Notes>
		<ReleaseDate>2024-10-12</ReleaseDate>
		<CVE>CVE-2024-8443</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.4</BaseScore>
				<Vector>AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>opensc security update</Description>
				<DATE>2024-10-12</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2245</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>