← Back to CVEs
CVE-2021-32845
HIGH7.7
Description
HyperKit is a toolkit for embedding hypervisor capabilities in an application. In versions 0.20210107 and prior of HyperKit, the implementation of `qnotify` at `pci_vtrnd_notify` fails to check the return value of `vq_getchain`. This leads to `struct iovec iov;` being uninitialized and used to read memory in `len = (int) read(sc->vrsc_fd, iov.iov_base, iov.iov_len);` when an attacker is able to make `vq_getchain` fail. This issue may lead to a guest crashing the host causing a denial of service and, under certain circumstance, memory corruption. This issue is fixed in commit 41272a980197917df8e58ff90642d14dec8fe948.
CVE Details
CVSS v3.1 Score7.7
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/17/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
mobyproject:hyperkit
Weaknesses (CWE)
CWE-908CWE-252
References
https://github.com/moby/hyperkit/commit/41272a980197917df8e58ff90642d14dec8fe948(security-advisories@github.com)
https://github.com/moby/hyperkit/pull/313(security-advisories@github.com)
https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/(security-advisories@github.com)
https://github.com/moby/hyperkit/commit/41272a980197917df8e58ff90642d14dec8fe948(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/moby/hyperkit/pull/313(af854a3a-2127-422b-91ae-364da2661108)
https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.