Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 694150 (CVE-2019-16058) - <sys-auth/pam_p11-0.3.1: buffer overflow when creating signatures longer than 256 bytes (CVE-2019-16058)
Summary: <sys-auth/pam_p11-0.3.1: buffer overflow when creating signatures longer than...
Status: RESOLVED FIXED
Alias: CVE-2019-16058
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://www.openwall.com/lists/oss-se...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-09-12 12:03 UTC by Agostino Sarubbo
Modified: 2020-04-16 07:43 UTC (History)
2 users (show)

See Also:
Package list:
sys-auth/pam_p11-0.3.1
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2019-09-12 12:03:42 UTC
From ${URL} :

I'm happy to announce the new pam_p11 release 0.3.1, which can be found
here https://github.com/OpenSC/pam_p11/releases/tag/pam_p11-0.3.1.
<https://github.com/OpenSC/pam_p11/releases/tag/pam_p11-0.3.1> This release
fixes a buffer overflow when creating signatures longer than 256 bytes
(CVE-2019-16058). This bug is present in pam_p11 version 0.2.0 and 0.3.0.



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2019-10-27 23:22:27 UTC
x86 stable
Comment 2 Agostino Sarubbo gentoo-dev 2019-10-28 07:42:08 UTC
amd64 stable
Comment 3 Agostino Sarubbo gentoo-dev 2019-11-12 10:39:55 UTC
ppc64 stable
Comment 4 Agostino Sarubbo gentoo-dev 2019-11-12 18:09:01 UTC
ppc stable
Comment 5 Agostino Sarubbo gentoo-dev 2019-11-13 16:10:25 UTC
ia64 stable
Comment 6 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-15 04:31:03 UTC
@maintainer(s): ok to clean up?
Comment 7 Larry the Git Cow gentoo-dev 2020-03-15 10:07:16 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=78b0a59692dc3a830b073207f85fccac839e64f7

commit 78b0a59692dc3a830b073207f85fccac839e64f7
Author:     Lars Wendler <polynomial-c@gentoo.org>
AuthorDate: 2020-03-15 10:04:07 +0000
Commit:     Lars Wendler <polynomial-c@gentoo.org>
CommitDate: 2020-03-15 10:04:07 +0000

    sys-auth/pam_p11: Security cleanup
    
    Bug: https://bugs.gentoo.org/694150
    Package-Manager: Portage-2.3.93, Repoman-2.3.20
    Signed-off-by: Lars Wendler <polynomial-c@gentoo.org>

 sys-auth/pam_p11/Manifest             |  1 -
 sys-auth/pam_p11/pam_p11-0.3.0.ebuild | 30 ------------------------------
 2 files changed, 31 deletions(-)
Comment 8 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-26 20:49:52 UTC
Tree is clean.
Comment 9 NATTkA bot gentoo-dev 2020-04-06 15:06:33 UTC
Resetting sanity check; keywords are not fully specified and arches are not CC-ed.
Comment 10 Yury German Gentoo Infrastructure gentoo-dev 2020-04-16 07:43:33 UTC
GLSA Vote: No
Thank you all for you work. 
Closing as [noglsa].