Skip to content

Out-of-bounds read in p11_rpc_buffer_get_byte_array function

Moderate
ueno published GHSA-5wpq-43j2-6qwc Dec 11, 2020

Package

No package listed

Affected versions

0.21.1 to 0.23.21

Patched versions

0.23.22

Description

Impact

A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.

Patches

The upstream 0.23.22 release should fix the issue.

Workarounds

None.

References

None.

For more information

If you have any questions or comments about this advisory:

If the questions should be treated confidential, follow our security policy to reach out to us.

Severity

Moderate

CVE ID

CVE-2020-29362

Weaknesses

No CWEs

Credits