An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/p11-glue/p11-kit/releases | third party advisory release notes |
https://www.debian.org/security/2021/dsa-4822 | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x | third party advisory |