CVE-2020-29363
Published: 16 December 2020
An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
p11-kit Launchpad, Ubuntu, Debian |
Upstream |
Released
(0.23.22-1)
|
Ubuntu 21.04 (Hirsute Hippo) |
Pending
(0.23.22-1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(0.23.21-2ubuntu0.1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(0.23.20-1ubuntu0.1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(0.23.9-2ubuntu0.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(code not present)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(code not present)
|
|
Patches: Upstream: https://github.com/p11-glue/p11-kit/commit/2617f3ef888e103324a28811886b99ed0a56346d (0.23.22) |