Skip to content

Out-of-bounds write in p11_rpc_buffer_get_byte_array_value function

Moderate
ueno published GHSA-5j67-fw89-fp6x Dec 11, 2020

Package

p11-kit

Affected versions

0.23.6 to 0.23.21

Patched versions

0.23.22

Description

Impact

A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.

Patches

The 0.23.22 upstream release should fix the issue.

Workarounds

None.

References

None.

For more information

If you have any questions or comments about this advisory:

If the questions should be treated confidential, follow our security policy to reach out to us.

Severity

Moderate

CVE ID

CVE-2020-29363

Weaknesses

No CWEs

Credits