HyperKit is a toolkit for embedding hypervisor capabilities in an application. In versions 0.20210107 and prior, a malicious guest can trigger a vulnerability in the host by abusing the disk driver that may lead to the disclosure of the host memory into the virtualized guest. This issue is fixed in commit cf60095a4d8c3cb2e182a14415467afd356e982f.
References
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/moby/hyperkit/blob/2f061e447e1435cdf1b9eda364cea6414f2c606b/src/lib/pci_virtio_block.c#L316 - Exploit, Product | |
References | () https://github.com/moby/hyperkit/commit/cf60095a4d8c3cb2e182a14415467afd356e982f - Patch | |
References | () https://securitylab.github.com/advisories/GHSL-2021-058-moby-hyperkit/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
Information
Published : 2023-02-20 17:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32847
Mitre link : CVE-2021-32847
CVE.ORG link : CVE-2021-32847
JSON object : View
Products Affected
mobyproject
- hyperkit
CWE
CWE-125
Out-of-bounds Read