Количество 10
Количество 10

CVE-2020-29362
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.

CVE-2020-29362
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.

CVE-2020-29362
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.

CVE-2020-29362
CVE-2020-29362
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-base ...

SUSE-SU-2022:2871-1
Security update for p11-kit

SUSE-SU-2022:2405-1
Security update for p11-kit

BDU:2021-03634
Уязвимость функции p11_rpc_buffer_get_byte_array библиотеки для работы с модулями PKCS P11-kit, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным

RLSA-2021:1609
Moderate: p11-kit security, bug fix, and enhancement update
ELSA-2021-1609
ELSA-2021-1609: p11-kit security, bug fix, and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2020-29362 An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation. | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2020-29362 An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation. | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2020-29362 An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation. | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
CVE-2020-29362 An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-base ... | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
![]() | SUSE-SU-2022:2871-1 Security update for p11-kit | 0% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2405-1 Security update for p11-kit | 0% Низкий | почти 3 года назад | |
![]() | BDU:2021-03634 Уязвимость функции p11_rpc_buffer_get_byte_array библиотеки для работы с модулями PKCS P11-kit, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | RLSA-2021:1609 Moderate: p11-kit security, bug fix, and enhancement update | около 4 лет назад | ||
ELSA-2021-1609 ELSA-2021-1609: p11-kit security, bug fix, and enhancement update (MODERATE) | около 4 лет назад |
Уязвимостей на страницу