Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <0a7efdf7-1e3b-5738-e8ad-50fa9cb7ae16@redhat.com>
Date: Tue, 4 May 2021 10:42:40 +0530
From: Huzaifa Sidhpurwala <huzaifas@...hat.com>
To: oss-security@...ts.openwall.com
Subject: hivex CVE-2021-3504

Hello,

A flaw was found in the hivex library. It is caused due to a lack of
bounds check within the hivex_open function. An attacker could input a
specially crafted Windows Registry (hive) file which would cause hivex
to read memory beyond its normal bounds or cause the program to crash.
The highest threat from this vulnerability is to system availability.

This issue has been patched upstream at:
https://listman.redhat.com/archives/libguestfs/2021-May/msg00013.html

Reference:
https://bugzilla.redhat.com/show_bug.cgi?id=1949687



-- 
Huzaifa Sidhpurwala / Red Hat Product Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.