Total vulnerabilities in the database
A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability.
Software | From | Fixed in |
---|---|---|
redhat / hivex | - | 1.3.21 |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux | 7.0 | 7.0.x |
redhat / enterprise_linux | 6.0 | 6.0.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
fedoraproject / fedora | 33 | 33.x |
fedoraproject / fedora | 34 | 34.x |