Path to this page:
Subject: CVS commit: pkgsrc/security/opensc
From: Adam Ciarcinski
Date: 2024-03-07 11:00:27
Message id: 20240307100027.CA07AFA2A@cvs.NetBSD.org
Log Message:
opensc: updated to 0.25.0
New in 0.25.0; 2024-03-06
Security
CVE-2023-5992: Side-channel leaks while stripping encryption PKCS#1.5 padding in \
OpenSC
CVE-2024-1454: Potential use-after-free in AuthentIC driver during card \
enrollment in pkcs15init
General improvements
Update OpenSSL 1.1.1 to 3.0 in MacOS build
Remove support for old card drivers Akis, GPK, Incrypto34 and Westcos, disable \
Cyberflex driver
Fix 64b to 32b conversions
Improvements for the p11test
Fix reader initialization without SCardControl
Make RSA PKCS#1 v1.5 depadding constant-time
Add option for disabling PKCS#1 v1.5 depadding (type 01 and 02) on the card
Enable MSI signing via Signpath CI integration for Windows
Fixed various issues reported by OSS-Fuzz and Coverity in drivers, PKCS#11 and \
PKCS#15 layer
minidriver
Fix wrong hash selection
pkcs11-tool
Simplify printing EC keys parameters
Add option to import GENERIC key
Add support for importing Ed25518/448 keys
drust-tool
Add tool for D-Trust cards
IDPrime
Support uncompressed certificates on IDPrime 940
Enhance IDPrime logging
Add SafeNet 5110+ FIPS token support
D-Trust Signature Cards
Add support for RSA D-Trust Signature Card 4.1 and 4.4
EstEID
Remove expired EstEID 3.* card support
ePass2003
Allow SW implementation with more SHA2 hashes and ECDSA
Fix EC key generation
SmartCard-HSM
Fix SELECT APDU command
MyEID
Update for PKCS#15 profile
Rutoken
Support for RSA 4096 key algorithm
OpenPGP
Fix decryption requiting Manage Security Environment for authentication key
Files: