First published: Wed Dec 16 2020(Updated: )
An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/p11-kit | 0.23.15-2+deb10u1 0.23.22-1 0.24.1-2 0.25.0-5 | |
IBM Cloud Pak for Security (CP4S) | >=0.23.6<0.23.22 | |
Debian Debian Linux | =10.0 | |
Oracle Communications Cloud Native Core Policy | =1.14.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29363 is a vulnerability in p11-glue p11-kit that can lead to a denial of service caused by a heap-based buffer overflow.
CVE-2020-29363 affects p11-kit versions 0.23.6 through 0.23.21 and can be exploited through the RPC protocol used by p11-kit server/remote commands and the client library.
CVE-2020-29363 has a severity rating of 7.5 (High).
CVE-2020-29363 affects p11-kit versions 0.23.6 through 0.23.21, and Cloud Pak for Security (CP4S) versions up to and including 1.7.2.0.
To fix CVE-2020-29363, update p11-kit to versions 0.23.22 or later, or the affected software to a version that includes the necessary security patches.