CVE-2020-29361

Summary

CVECVE-2020-29361
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2020-12-16 14:15:00 UTC
Updated2023-11-07 03:21:00 UTC
DescriptionAn issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.

Risk And Classification

Problem Types: CWE-190

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 10.0 All All All
Operating System Debian Debian Linux 9.0 All All All
Application P11-kit Project P11-kit All All All All

References

ReferenceSourceLinkTags
[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 lists.apache.org
Pony Mail! MLIST lists.apache.org
Releases · p11-glue/p11-kit · GitHub MISC github.com Release Notes, Third Party Advisory
[SECURITY] [DLA 2513-1] p11-kit security update MLIST lists.debian.org
Debian -- Security Information -- DSA-4822-1 p11-kit DEBIAN www.debian.org
Pony Mail! MLIST lists.apache.org
[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 lists.apache.org
Integer overflow when allocating memory for arrays of attributes and object identifiers · Advisory · p11-glue/p11-kit · GitHub MISC github.com Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 159195 Oracle Enterprise Linux Security Update for p11-kit (ELSA-2021-1609)
  • 239329 Red Hat Update for p11-kit (RHSA-2021:1609)
  • 296059 Oracle Solaris 11.4 Support Repository Update (SRU) 36.0.1.101.2 Missing (CPUJUL2021)
  • 377326 Alibaba Cloud Linux Security Update for p11-kit (ALINUX3-SA-2022:0088)
  • 500505 Alpine Linux Security Update for p11-kit
  • 504264 Alpine Linux Security Update for p11-kit
  • 591406 Siemens SIMATIC S7-1500 CPU GNU/Linux subsystem Multiple Vulnerabilities (SSB-439005, ICSA-22-104-13)
  • 670198 EulerOS Security Update for p11-kit (EulerOS-SA-2021-1697)
  • 690362 Free Berkeley Software Distribution (FreeBSD) Security Update for p11-kit (fdc49972-3ca7-11eb-929d-d4c9ef517024)
  • 751539 SUSE Enterprise Linux Security Update for p11-kit (SUSE-SU-2021:4154-1)
  • 751543 OpenSUSE Security Update for p11-kit (openSUSE-SU-2021:4154-1)
  • 751551 OpenSUSE Security Update for p11-kit (openSUSE-SU-2021:1611-1)
  • 751683 SUSE Enterprise Linux Security Update for samba (SUSE-SU-2022:0323-1)
  • 900150 CBL-Mariner Linux Security Update for p11-kit 0.23.16.1
  • 902934 Common Base Linux Mariner (CBL-Mariner) Security Update for p11-kit (3685)
  • 940143 AlmaLinux Security Update for p11-kit (ALSA-2021:1609)
  • 960399 Rocky Linux Security Update for p11-kit (RLSA-2021:1609)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report