First published: Wed Dec 16 2020(Updated: )
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/p11-kit | 0.23.15-2+deb10u1 0.23.22-1 0.24.1-2 0.25.0-5 | |
IBM Cloud Pak for Security (CP4S) | >=0.23.6<0.23.22 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29362 is a vulnerability discovered in p11-kit, allowing a remote attacker to obtain sensitive information.
The severity of CVE-2020-29362 is medium with a CVSS score of 5.3.
CVE-2020-29362 affects p11-kit versions 0.21.1 through 0.23.21.
CVE-2020-29362 can be exploited by a remote attacker through the RPC protocol used by the p11-kit server/remote commands and the client library.
Yes, fixes are available for CVE-2020-29362. Please update to p11-kit versions 0.23.15-2+deb10u1, 0.23.22-1, 0.24.1-2, or 0.25.0-5.