CVE-2020-29363

Name
CVE-2020-29363
Description
An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Release Notes https://github.com/p11-glue/p11-kit/releases
Third Party Advisory https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x
Third Party Advisory https://www.debian.org/security/2021/dsa-4822
MISC https://www.oracle.com/security-alerts/cpuapr2022.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:p11-kit_project:p11-kit:*:*:*:*:*:*:*:* p11-kit >= 0.23.6 < 0.23.22

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
p11-kit 3.13-main 0.23.22-r0 Fabian Affolter <fabian@affolter-engineering.ch> fixed
p11-kit 3.12-main 0.23.22-r0 Fabian Affolter <fabian@affolter-engineering.ch> fixed
p11-kit 3.11-main 0.23.18.1-r1 Fabian Affolter <fabian@affolter-engineering.ch> fixed
p11-kit 3.10-main 0.23.16.1-r1 Fabian Affolter <fabian@affolter-engineering.ch> fixed
p11-kit 3.14-main 0.23.22-r0 Fabian Affolter <fabian@affolter-engineering.ch> fixed