{"vulnerability": "CVE-2020-29363", "sightings": [{"uuid": "039c0f4d-762f-44e9-ad1d-78b62fad09eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29363", "type": "seen", "source": "https://t.me/cibsecurity/20914", "content": "\u203c CVE-2020-29363 \u203c\n\nAn issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T16:41:32.000000Z"}]}