The reported issues are part of the libopensc library, which makes them accessible from OpenSC tools, PKCS#11 module, minidriver, or CTK. The attack requires a crafted USB device or smart card that would present the system with specially crafted responses to the APDUs, so they are considered high complexity and low severity. When buffers are partially filled with data, uninitialized parts of the buffer can be incorrectly accessed. The uninitialized variables were reflected in the following functions: - insert_cert - asn1_encode_path - gemsafe_get_cert_len - setcos_generate_key - sc_hsm_determine_free_id - coolkey_rsa_op Originally reported by Matteo Marini (Sapienza University of Rome)