CVE-2019-16058

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-16058
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16058.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-16058
Related
Published
2019-09-06T18:15:15Z
Modified
2024-11-21T04:29:58Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.

References

Affected packages

Debian:11 / pam-p11

Package

Name
pam-p11
Purl
pkg:deb/debian/pam-p11?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / pam-p11

Package

Name
pam-p11
Purl
pkg:deb/debian/pam-p11?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / pam-p11

Package

Name
pam-p11
Purl
pkg:deb/debian/pam-p11?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}