MGASA-2021-0041

Source
https://advisories.mageia.org/MGASA-2021-0041.html
Import Source
https://advisories.mageia.org/MGASA-2021-0041.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0041
Related
Published
2021-01-17T16:07:01Z
Modified
2021-01-17T15:26:16Z
Summary
Updated p11-kit packages fix security vulnerabilities
Details

Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc (CVE-2020-29361).

A heap-based buffer over-read has been discovered in the RPC protocol used by the p11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation (CVE-2020-29362).

A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value (CVE-2020-29363).

References
Credits

Affected packages

Mageia:7 / p11-kit

Package

Name
p11-kit
Purl
pkg:rpm/mageia/p11-kit?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23.22-1.mga7

Ecosystem specific

{
    "section": "core"
}