First published: Wed Jun 23 2021(Updated: )
A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/hivex | <1.3.21 | 1.3.21 |
Redhat Hivex | <1.3.21 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3622 is a vulnerability in the hivex library that allows an attacker to input a specially crafted Windows Registry file, leading to a stack overflow.
The severity of CVE-2021-3622 is medium with a CVSS score of 4.3.
Software affected by CVE-2021-3622 includes hivex version up to exclusive 1.3.21, Red Hat Enterprise Linux versions 6.0, 7.0, and 8.0, Red Hat Enterprise Linux Workstation version 7.0, and Fedora versions 33 and 34.
To fix CVE-2021-3622, update the hivex library to version 1.3.21 or apply the appropriate patches provided by Red Hat.
You can find more information about CVE-2021-3622 in the references provided: [1] [2] [3].