{"id":"AZL-27012","summary":"CVE-2023-2977 affecting package opensc for versions less than 0.22.0-3","details":"A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.","modified":"2026-04-01T05:08:54.485015Z","published":"2023-06-01T01:15:17Z","upstream":["CVE-2023-2977"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2977"}],"affected":[{"package":{"name":"opensc","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/opensc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.22.0-3"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-27012.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}