vulnerability
SUSE: CVE-2020-29362: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | 12/16/2020 | 08/09/2024 | 08/09/2024 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
12/16/2020
Added
08/09/2024
Modified
08/09/2024
Description
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.
Solution(s)
suse-upgrade-libp11-kit0suse-upgrade-libp11-kit0-32bitsuse-upgrade-p11-kitsuse-upgrade-p11-kit-32bitsuse-upgrade-p11-kit-develsuse-upgrade-p11-kit-nss-trustsuse-upgrade-p11-kit-nss-trust-32bitsuse-upgrade-p11-kit-serversuse-upgrade-p11-kit-tools

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.