CVE-2020-29363

high

Description

An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.

References

https://www.oracle.com/security-alerts/cpuapr2022.html

https://www.debian.org/security/2021/dsa-4822

https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x

https://github.com/p11-glue/p11-kit/releases

Details

Source: Mitre, NVD

Published: 2020-12-16

Updated: 2022-05-12

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Severity: High