{"id":"MGASA-2021-0320","summary":"Updated hivex packages fix a security vulnerability","details":"A flaw was found in the hivex library. It is caused due to a lack of bounds\ncheck within the hivex_open function. An attacker could input a specially\ncrafted Windows Registry (hive) file which would cause hivex to read memory\nbeyond its normal bounds or cause the program to crash. The highest threat\nfrom this vulnerability is to system availability (CVE-2021-3504).\n","modified":"2026-04-16T04:42:46.633607342Z","published":"2021-07-08T22:43:19Z","upstream":["CVE-2021-3504"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0320.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=28925"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/A5BNKNVYFL36P2GBEB5O36LHFRYU575H/"}],"affected":[{"package":{"name":"hivex","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/hivex?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.20-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0320.json"}},{"package":{"name":"hivex","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/hivex?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.20-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0320.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}