A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.
References
Configurations
History
23 Mar 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
16 Mar 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
16 Mar 2024, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
26 Feb 2024, 16:27
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
14 Feb 2024, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
09 Feb 2024, 01:00
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
| CPE | cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
|
| First Time |
Redhat enterprise Linux
Redhat Opensc Project Opensc Project opensc |
|
| Summary |
|
|
| References | () https://access.redhat.com/security/cve/CVE-2023-5992 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2248685 - Issue Tracking | |
| References | () https://github.com/OpenSC/OpenSC/wiki/CVE-2023-5992 - Vendor Advisory | |
| CWE | CWE-203 |
31 Jan 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-31 14:15
Updated : 2024-03-23 03:15
NVD link : CVE-2023-5992
Mitre link : CVE-2023-5992
CVE.ORG link : CVE-2023-5992
JSON object : View
Products Affected
opensc_project
- opensc
redhat
- enterprise_linux
CWE
CWE-203
Observable Discrepancy
