{"id":"CVE-2023-5992","details":"A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.","modified":"2026-04-11T12:46:54.301497Z","published":"2024-01-31T14:15:48.147Z","related":["ALSA-2024:0966","ALSA-2024:0967","MGASA-2024-0101","SUSE-SU-2024:1402-1","SUSE-SU-2024:1402-2","SUSE-SU-2024:1625-1","SUSE-SU-2024:1773-1","SUSE-SU-2025:02754-1","SUSE-SU-2025:20530-1","SUSE-SU-2025:20671-1","openSUSE-SU-2024:13765-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0_aarch64"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0_aarch64"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.4_aarch64"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0_s390x"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0_s390x"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.4_s390x"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0_ppc64le"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.4_ppc64le"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.2"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.4_ppc64le"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/12/msg00026.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0966"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0967"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-5992"},{"type":"ADVISORY","url":"https://github.com/OpenSC/OpenSC/wiki/CVE-2023-5992"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2248685"},{"type":"EVIDENCE","url":"https://www.usenix.org/system/files/usenixsecurity24-shagam.pdf"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/opensc/opensc","events":[{"introduced":"0"},{"fixed":"67986eda93a3a359a897f0b0be97f4315dde8d42"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"0.25.0"}],"cpe":"cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*"}}],"versions":["0.12.2","0.12.2-rc1","0.13.0","0.13.0pre1","0.13.0rc1","0.14.0","0.14.0rc2","0.14.0rtm","0.15.0","0.16.0","0.17.0","0.17.0-rc1","0.17.0-rc2","0.18.0","0.18.0-rc1","0.18.0-rc2","0.19.0","0.19.0-rc1","0.20.0","0.20.0-rc1","0.20.0-rc2","0.20.0-rc3","0.20.0-rc4","0.21.0","0.21.0-rc1","0.21.0-rc2","0.22.0","0.22.0-rc1","0.22.0-rc2","0.23.0","0.23.0-rc1","0.23.0-rc2","0.24.0","0.24.0-rc1","0.24.0-rc2","0.25.0-rc1","v0.12.2","v0.16.0-pre1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-5992.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}