p11-kit -- Multiple vulnerabilities
The p11-glue project reports:
CVE-2020-29363: Out-of-bounds write in
A heap-based buffer
overflow has been discovered in the RPC protocol used by p11-kit
server/remote commands and the client library. When the remote
entity supplies a serialized byte array in a CK_ATTRIBUTE, the
receiving entity may not allocate sufficient length for the buffer
to store the deserialized value.
CVE-2020-29362: Out-of-bounds read in p11_rpc_buffer_get_byte_array
A heap-based buffer over-read has been discovered in
the RPC protocol used by thep11-kit server/remote commands and the
client library. When the remote entity supplies a byte array through
a serialized PKCS#11 function call, the receiving entity may allow
the reading of up to 4 bytes of memory past the heap
CVE-2020-29361: Integer overflow when allocating memory for arrays
of attributes and object identifiers
Multiple integer overflows
have been discovered in the array allocations in the p11-kit library
and the p11-kit list command, where overflow checks are missing
before calling realloc or calloc.
Copyright © 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright