vulnerability

SUSE: CVE-2020-29362: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
12/16/2020
Added
08/09/2024
Modified
08/09/2024

Description

An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.

Solution(s)

suse-upgrade-libp11-kit0suse-upgrade-libp11-kit0-32bitsuse-upgrade-p11-kitsuse-upgrade-p11-kit-32bitsuse-upgrade-p11-kit-develsuse-upgrade-p11-kit-nss-trustsuse-upgrade-p11-kit-nss-trust-32bitsuse-upgrade-p11-kit-serversuse-upgrade-p11-kit-tools
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.