{"id":"MGASA-2021-0512","summary":"Updated opensc packages fix security vulnerability","details":"CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).\nCVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).\nCVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c\n (bsc#1192000).\nCVE-2021-42782: Stack buffer overflow issues in various places\n (bsc#1191957).\n","modified":"2026-01-30T09:13:31.623552Z","published":"2021-11-18T21:50:59Z","related":["CVE-2021-42779","CVE-2021-42780","CVE-2021-42781","CVE-2021-42782"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0512.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29607"},{"type":"REPORT","url":"https://lists.suse.com/pipermail/sle-security-updates/2021-October/009683.html"}],"affected":[{"package":{"name":"opensc","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/opensc?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.22.0-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0512.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}