vulnerability

Red Hat: CVE-2020-29363: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Dec 16, 2020
Added
May 21, 2021
Modified
Aug 11, 2025

Description

An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.

Solutions

redhat-upgrade-p11-kitredhat-upgrade-p11-kit-debuginforedhat-upgrade-p11-kit-debugsourceredhat-upgrade-p11-kit-develredhat-upgrade-p11-kit-serverredhat-upgrade-p11-kit-server-debuginforedhat-upgrade-p11-kit-trustredhat-upgrade-p11-kit-trust-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.