Bug 1903592 (CVE-2020-29361) - CVE-2020-29361 p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers
Summary: CVE-2020-29361 p11-kit: integer overflow when allocating memory for arrays or...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-29361
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1906814 1907912 1907914 1909020 1909021
Blocks: 1902080
TreeView+ depends on / blocked
 
Reported: 2020-12-02 13:01 UTC by Guilherme de Almeida Suckevicz
Modified: 2023-09-26 14:54 UTC (History)
8 users (show)

Fixed In Version: p11-kit 0.23.22
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-05-18 20:37:54 UTC
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2020-12-02 13:01:54 UTC
There are multiple arithmetic overflow bugs when allocating memory for arrays, such as arrays of attributes and arrays of object identifiers. In some cases, these are reachable from the RPC protocol. This flaw could lead to a buffer overflow.

Comment 2 Guilherme de Almeida Suckevicz 2020-12-15 13:55:44 UTC
Created mingw-p11-kit tracking bugs for this issue:

Affects: fedora-all [bug 1907914]


Created p11-kit tracking bugs for this issue:

Affects: fedora-all [bug 1907912]

Comment 3 Cedric Buissart 2020-12-18 08:17:30 UTC
External References:

https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2

Comment 7 Cedric Buissart 2021-01-11 15:22:02 UTC
Statement:

The p11-kit library is primarily intended to be used locally, in which case the attacker needs to have sufficient permission to access the p11-kit communication. Although there may be use cases of p11-kit being used with a remote entity, all parties must be considered trusted.
As a result, Red Hat considers this vulnerability with a Medium severity.

Comment 8 errata-xmlrpc 2021-05-18 13:40:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1609 https://access.redhat.com/errata/RHSA-2021:1609

Comment 9 Product Security DevOps Team 2021-05-18 20:37:54 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-29361


Note You need to log in before you can comment on or make changes to this bug.