CVE-2021-32845

HyperKit is a toolkit for embedding hypervisor capabilities in an application. In versions 0.20210107 and prior of HyperKit, the implementation of `qnotify` at `pci_vtrnd_notify` fails to check the return value of `vq_getchain`. This leads to `struct iovec iov;` being uninitialized and used to read memory in `len = (int) read(sc->vrsc_fd, iov.iov_base, iov.iov_len);` when an attacker is able to make `vq_getchain` fail. This issue may lead to a guest crashing the host causing a denial of service and, under certain circumstance, memory corruption. This issue is fixed in commit 41272a980197917df8e58ff90642d14dec8fe948.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mobyproject:hyperkit:*:*:*:*:*:*:*:*

History

26 Jun 2023, 17:47

Type Values Removed Values Added
CWE CWE-908 CWE-252

28 Feb 2023, 20:29

Type Values Removed Values Added
First Time Mobyproject hyperkit
Mobyproject
CPE cpe:2.3:a:mobyproject:hyperkit:*:*:*:*:*:*:*:*
CWE CWE-908
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References (MISC) https://github.com/moby/hyperkit/commit/41272a980197917df8e58ff90642d14dec8fe948 - (MISC) https://github.com/moby/hyperkit/commit/41272a980197917df8e58ff90642d14dec8fe948 - Patch
References (CONFIRM) https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ - (CONFIRM) https://securitylab.github.com/advisories/GHSL-2021-054_057-moby-hyperkit/ - Third Party Advisory
References (MISC) https://github.com/moby/hyperkit/pull/313 - (MISC) https://github.com/moby/hyperkit/pull/313 - Patch

17 Feb 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-17 23:15

Updated : 2023-12-10 14:48


NVD link : CVE-2021-32845

Mitre link : CVE-2021-32845

CVE.ORG link : CVE-2021-32845


JSON object : View

Products Affected

mobyproject

  • hyperkit
CWE
CWE-252

Unchecked Return Value

CWE-908

Use of Uninitialized Resource