Impact
A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.
Patches
The 0.23.22 upstream release should fix the issue.
Workarounds
None.
References
None.
For more information
If you have any questions or comments about this advisory:
If the questions should be treated confidential, follow our security policy to reach out to us.
Impact
A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.
Patches
The 0.23.22 upstream release should fix the issue.
Workarounds
None.
References
None.
For more information
If you have any questions or comments about this advisory:
If the questions should be treated confidential, follow our security policy to reach out to us.