An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16058.json"
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"162363753212461777081824812064729144627",
"216045659055189613445803810482430021434",
"70950728248496190425375449447116115015",
"154127084794894806416625549598014099001",
"226066714158580332592104571146303775909",
"236984839242435769405116835167087037706",
"168045242271497000429826848660957892415",
"103765529676600892212743505482397224936",
"113426758573064634728824859227545768477",
"74225506179505323341328657517246753981",
"249562561133291893300204519156253586322",
"75083263486971359263281513938742561136",
"184851543072915211469331104093339297418",
"31278750119548292869372104776925210947",
"1075937932852327229820200513082884387",
"115209400729526934431880045001090369921",
"77470968049125389952613629853199375656"
]
},
"id": "CVE-2019-16058-53eb61f9",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"source": "https://github.com/opensc/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c",
"target": {
"file": "src/pam_p11.c"
}
},
{
"digest": {
"length": 1030.0,
"function_hash": "78493869453006783845009778640752102668"
},
"id": "CVE-2019-16058-8bee1f41",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"source": "https://github.com/opensc/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c",
"target": {
"function": "key_verify",
"file": "src/pam_p11.c"
}
}
]
"2026-04-11T12:42:29Z"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.3.0"
}
]
}
]