CVE-2019-16058

Source
https://cve.org/CVERecord?id=CVE-2019-16058
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16058.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-16058
Downstream
Related
Published
2019-09-06T18:15:15.507Z
Modified
2026-04-11T12:42:29.769505Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.

References

Affected packages

Git / github.com/opensc/pam_p11

Affected ranges

Type
GIT
Repo
https://github.com/opensc/pam_p11
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/opensc/pam_p11
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

pam_p11-0.*
pam_p11-0.1.6
pam_p11-0.2.0
pam_p11-0.3.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16058.json"
vanir_signatures
[
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "162363753212461777081824812064729144627",
                "216045659055189613445803810482430021434",
                "70950728248496190425375449447116115015",
                "154127084794894806416625549598014099001",
                "226066714158580332592104571146303775909",
                "236984839242435769405116835167087037706",
                "168045242271497000429826848660957892415",
                "103765529676600892212743505482397224936",
                "113426758573064634728824859227545768477",
                "74225506179505323341328657517246753981",
                "249562561133291893300204519156253586322",
                "75083263486971359263281513938742561136",
                "184851543072915211469331104093339297418",
                "31278750119548292869372104776925210947",
                "1075937932852327229820200513082884387",
                "115209400729526934431880045001090369921",
                "77470968049125389952613629853199375656"
            ]
        },
        "id": "CVE-2019-16058-53eb61f9",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "source": "https://github.com/opensc/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c",
        "target": {
            "file": "src/pam_p11.c"
        }
    },
    {
        "digest": {
            "length": 1030.0,
            "function_hash": "78493869453006783845009778640752102668"
        },
        "id": "CVE-2019-16058-8bee1f41",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "source": "https://github.com/opensc/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c",
        "target": {
            "function": "key_verify",
            "file": "src/pam_p11.c"
        }
    }
]
vanir_signatures_modified
"2026-04-11T12:42:29Z"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "0.2.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "0.3.0"
            }
        ]
    }
]