Upstream released opensc version 0.11.7, fixing a security issue in the private data handling: http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html Quoting upstream advisory below: OpenSC Security Advisory [26-Feb-2009] CVE-2009-0368 ---------------------------------------------------- OpenSC stores private data without proper access restrictions. User "b.badrignans" reported this security problem on December 4th, 2008. In June 2007 support form private data objects was added to OpenSC. Only later a severe security bug was found out: while the OpenSC PKCS#11 implementation requires PIN verification to access the data, low level APDU commands or debugging tools like opensc-explorer or opensc-tool can access the private data without any authentication. This was fixed in OpenSC 0.11.7. RSA keys are not affected by this security problem. National eID cards and other cards initialised by other software are not affected by this problem. Only blank cards initialised with OpenSC are affected by this problem. It is not known if the problem is limited to some drivers, but we believe all drivers are affected. We could only test very few cards, but all of them had the problem, and the fix worked on all of them. All other cards are completely untested for either. This fix only improves creating new private data objects. Cards already initialised with such private data objects need to be modified to repair the access control conditions on such cards. One way to do that is to erase the card and re-initialise it, but doing this you would loose all content on the card, including RSA private keys. An alternative is to download the private data object(s) to your PC, delete them on the card, and store them once more on the card with the new, fixed version of OpenSC. This procedure has been tested with success on some cards, but no guaranty of any kind can be given.
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-0368 to the following vulnerability: Name: CVE-2009-0368 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368 Assigned: 20090129 Reference: MLIST:[opensc-announce] 20090226 OpenSC Security Advisory Reference: URL: http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html Reference: MLIST:[oss-security] 20090226 OpenSC Security Advisory Reference: URL: http://openwall.com/lists/oss-security/2009/02/26/1 Reference: BID:33922 Reference: URL: http://www.securityfocus.com/bid/33922 Reference: SECUNIA:34052 Reference: URL: http://secunia.com/advisories/34052 Reference: XF:opensc-pkcs-unauth-access(48958) Reference: URL: http://xforce.iss.net/xforce/xfdb/48958 OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
opensc-0.11.7-1.fc9 has been submitted as an update for Fedora 9. http://admin.fedoraproject.org/updates/opensc-0.11.7-1.fc9
opensc-0.11.7-1.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/opensc-0.11.7-1.fc10
opensc-0.11.7-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
opensc-0.11.7-1.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.