Advisories

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4913-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
May 10, 2021                          https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : hivex
CVE ID         : CVE-2021-3504
Debian Bug     : 988024

Jemery Galindo discovered an out-of-bounds memory access in Hivex, a
library to parse Windows Registry hive files.

For the stable distribution (buster), this problem has been fixed in
version 1.3.18-1+deb10u1.

We recommend that you upgrade your hivex packages.

For the detailed security status of hivex please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/hivex

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Warning: getimagesize(/images/distros-large/debian-large.png): failed to open stream: No such file or directory in /var/www/webstage.linuxsecurity.com-443/html/templates/newsberg/html/com_content/article/default.php on line 107

Warning: Division by zero in /var/www/webstage.linuxsecurity.com-443/html/templates/newsberg/html/com_content/article/default.php on line 110

Debian: DSA-4913-1: hivex security update

Jemery Galindo discovered an out-of-bounds memory access in Hivex, a library to parse Windows Registry hive files. For the stable distribution (buster), this problem has been fixed in
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4913-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
https://www.debian.org/security/                       Moritz Muehlenhoff
May 10, 2021                          https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : hivex
CVE ID         : CVE-2021-3504
Debian Bug     : 988024

Jemery Galindo discovered an out-of-bounds memory access in Hivex, a
library to parse Windows Registry hive files.

For the stable distribution (buster), this problem has been fixed in
version 1.3.18-1+deb10u1.

We recommend that you upgrade your hivex packages.

For the detailed security status of hivex please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/hivex

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

Print  

Debian: DSA-4913-1: hivex security update

May 10, 2021
Jemery Galindo discovered an out-of-bounds memory access in Hivex, a library to parse Windows Registry hive files. For the stable distribution (buster), this problem has been fixed in

Summary

Jemery Galindo discovered an out-of-bounds memory access in Hivex, a library to parse Windows Registry hive files. For the stable distribution (buster), this problem has been fixed in version 1.3.18-1+deb10u1. We recommend that you upgrade your hivex packages. For the detailed security status of hivex please refer to its security tracker page at: https://security-tracker.debian.org/tracker/hivex Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

Debian Security Advisory DSA-4913-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff May 10, 2021 https://www.debian.org/security/faq

Severity
Package : hivex
CVE ID : CVE-2021-3504
Debian Bug : 988024

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.