CVE-2020-29363

Published: 16 December 2020

An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
p11-kit
Launchpad, Ubuntu, Debian
Upstream
Released (0.23.22-1)
Ubuntu 21.04 (Hirsute Hippo)
Released (0.23.22-1)
Ubuntu 20.10 (Groovy Gorilla)
Released (0.23.21-2ubuntu0.1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (0.23.20-1ubuntu0.1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (0.23.9-2ubuntu0.1)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(code not present)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(code not present)
Patches:
Upstream: https://github.com/p11-glue/p11-kit/commit/2617f3ef888e103324a28811886b99ed0a56346d (0.23.22)