MGASA-2021-0320

Source
https://advisories.mageia.org/MGASA-2021-0320.html
Import Source
https://advisories.mageia.org/MGASA-2021-0320.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0320
Related
Published
2021-07-08T22:43:19Z
Modified
2021-07-08T21:25:40Z
Summary
Updated hivex packages fix a security vulnerability
Details

A flaw was found in the hivex library. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability (CVE-2021-3504).

References
Credits

Affected packages

Mageia:8 / hivex

Package

Name
hivex
Purl
pkg:rpm/mageia/hivex?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.20-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / hivex

Package

Name
hivex
Purl
pkg:rpm/mageia/hivex?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.20-1.mga7

Ecosystem specific

{
    "section": "core"
}