Bug 1810660
| Summary: | Rebase OpenSC to address security issues | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Jakub Jelen <jjelen> |
| Component: | opensc | Assignee: | Jakub Jelen <jjelen> |
| Status: | CLOSED ERRATA | QA Contact: | PKI QE <bugzilla-pkiqe> |
| Severity: | unspecified | Docs Contact: | Khushbu Borole <kborole> |
| Priority: | medium | ||
| Version: | 8.3 | CC: | aakkiang, mjahoda, orion, ssorce, sveerank |
| Target Milestone: | rc | Keywords: | Rebase, Triaged |
| Target Release: | 8.3 | Flags: | kborole:
needinfo-
pm-rhel: mirror+ |
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | opensc-0.20.0-1.el8 | Doc Type: | Enhancement |
| Doc Text: |
.OpenSC rebased to version 0.20.0
The `opensc` package has been rebased to version 0.20.0 which addresses multiple bugs and security issues. Notable changes include:
* With this update, *CVE-2019-6502*, *CVE-2019-15946*, *CVE-2019-15945*, *CVE-2019-19480*, *CVE-2019-19481* and *CVE-2019-19479* security issues are fixed.
* The OpenSC module now supports the `C_WrapKey` and `C_UnwrapKey` functions.
* You can now use the facility to detect insertion and removal of card readers as expected.
* The `pkcs11-tool` utility now supports the `CKA_ALLOWED_MECHANISMS` attribute.
* This update allows default detection of the *OsEID* cards.
* The OpenPGP Card v3 now supports *Elliptic Curve Cryptography* (ECC).
* The PKCS#11 URI now truncates the reader name with ellipsis.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-11-04 01:44:28 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Jakub Jelen
2020-03-05 16:58:27 UTC
FWIW - this also appears to resolve issues with alternative slots similar to bug #1690552 that I was seeing in 8.2 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: opensc security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2020:4483 |