Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-26571

Опубликовано: 06 окт. 2020
Источник: debian
EPSS Низкий

Описание

The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openscfixed0.21.0-1package
openscfixed0.19.0-1+deb10u1busterpackage

Примечания

  • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20612

  • https://github.com/OpenSC/OpenSC/commit/ed55fcd2996930bf58b9bb57e9ba7b1f3a753c43 (0.21.0-rc1)

EPSS

Процентиль: 13%
0.00043
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.

CVSS3: 5.3
redhat
больше 4 лет назад

The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.

CVSS3: 5.5
nvd
больше 4 лет назад

The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.

CVSS3: 5.5
msrc
больше 3 лет назад

Описание отсутствует

github
около 3 лет назад

The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.

EPSS

Процентиль: 13%
0.00043
Низкий