7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.006 Low
EPSS
Percentile
77.4%
An update is available for p11-kit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files.
The following packages have been upgraded to a later upstream version: p11-kit (0.23.22). (BZ#1887853)
Security Fix(es):
p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers (CVE-2020-29361)
p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (CVE-2020-29362)
p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (CVE-2020-29363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
rocky | 8 | aarch64 | p11-kit | < 0.23.22-1.el8 | p11-kit-0:0.23.22-1.el8.aarch64.rpm |
rocky | 8 | i686 | p11-kit | < 0.23.22-1.el8 | p11-kit-0:0.23.22-1.el8.i686.rpm |
rocky | 8 | x86_64 | p11-kit | < 0.23.22-1.el8 | p11-kit-0:0.23.22-1.el8.x86_64.rpm |
rocky | 8 | aarch64 | p11-kit-debuginfo | < 0.23.22-1.el8 | p11-kit-debuginfo-0:0.23.22-1.el8.aarch64.rpm |
rocky | 8 | i686 | p11-kit-debuginfo | < 0.23.22-1.el8 | p11-kit-debuginfo-0:0.23.22-1.el8.i686.rpm |
rocky | 8 | x86_64 | p11-kit-debuginfo | < 0.23.22-1.el8 | p11-kit-debuginfo-0:0.23.22-1.el8.x86_64.rpm |
rocky | 8 | aarch64 | p11-kit-debugsource | < 0.23.22-1.el8 | p11-kit-debugsource-0:0.23.22-1.el8.aarch64.rpm |
rocky | 8 | i686 | p11-kit-debugsource | < 0.23.22-1.el8 | p11-kit-debugsource-0:0.23.22-1.el8.i686.rpm |
rocky | 8 | x86_64 | p11-kit-debugsource | < 0.23.22-1.el8 | p11-kit-debugsource-0:0.23.22-1.el8.x86_64.rpm |
rocky | 8 | aarch64 | p11-kit-devel | < 0.23.22-1.el8 | p11-kit-devel-0:0.23.22-1.el8.aarch64.rpm |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.006 Low
EPSS
Percentile
77.4%