vulnerability
Red Hat: CVE-2020-29362: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | 2020-12-16 | 2021-05-21 | 2024-11-26 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
2020-12-16
Added
2021-05-21
Modified
2024-11-26
Description
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.
Solution(s)
redhat-upgrade-p11-kitredhat-upgrade-p11-kit-debuginforedhat-upgrade-p11-kit-debugsourceredhat-upgrade-p11-kit-develredhat-upgrade-p11-kit-serverredhat-upgrade-p11-kit-server-debuginforedhat-upgrade-p11-kit-trustredhat-upgrade-p11-kit-trust-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.