Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Opensc
(Opensc_project)Repositories | https://github.com/OpenSC/OpenSC |
#Vulnerabilities | 44 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-09-05 | CVE-2019-15946 | OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c. | Debian_linux, Fedora, Opensc | 6.4 | ||
2019-12-01 | CVE-2019-19479 | An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during parsing of a SETCOS file attribute. | Debian_linux, Fedora, Opensc | 5.5 | ||
2019-12-01 | CVE-2019-19480 | An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry. | Opensc | 4.6 | ||
2019-12-01 | CVE-2019-19481 | An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-cac1.c mishandles buffer limits for CAC certificates. | Opensc | 4.6 | ||
2020-10-06 | CVE-2020-26570 | The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file. | Debian_linux, Fedora, Opensc | 5.5 | ||
2020-10-06 | CVE-2020-26571 | The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init. | Debian_linux, Fedora, Opensc | 5.5 | ||
2020-10-06 | CVE-2020-26572 | The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher. | Debian_linux, Fedora, Opensc | 5.5 | ||
2023-06-01 | CVE-2023-2977 | A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or... | Opensc, Enterprise_linux | 7.1 | ||
2019-01-22 | CVE-2019-6502 | sc_context_create in ctx.c in libopensc in OpenSC 0.19.0 has a memory leak, as demonstrated by a call from eidenv. | Opensc | 7.5 | ||
2022-04-18 | CVE-2021-42779 | A heap use after free issue was found in Opensc before version 0.22.0 in sc_file_valid. | Fedora, Opensc, Enterprise_linux | 5.3 |