-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1579
                           hivex security update
                                11 May 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           hivex
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Denial of Service     -- Remote with User Interaction
                   Read-only Data Access -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3504  

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2021/msg00094.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running hivex check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4913-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
May 10, 2021                          https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : hivex
CVE ID         : CVE-2021-3504
Debian Bug     : 988024

Jemery Galindo discovered an out-of-bounds memory access in Hivex, a
library to parse Windows Registry hive files.

For the stable distribution (buster), this problem has been fixed in
version 1.3.18-1+deb10u1.

We recommend that you upgrade your hivex packages.

For the detailed security status of hivex please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/hivex

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=0RQ5
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=hh6+
-----END PGP SIGNATURE-----