CVE-2021-31616
Insufficient length checks in the ShapeShift KeepKey hardware wallet firmware before 7.1.0 allow a stack buffer overflow via crafted messages. The overflow in ethereum_extractThorchainSwapData() in ethereum.c can circumvent stack protections and lead to code execution. The vulnerable interface is reachable remotely over WebUSB.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://blog.inhq.net/posts/keepkey-CVE-2021-31616/, https://github.com/keepkey/keepkey-firmware/commit/e49d45594002d4d3fbc1f03488e6dfc0a0a65836, https://github.com/keepkey/keepkey-firmware/releases/tag/v7.1.0, https://shapeshift.com/library/keepkey-important-update-issued-april-4-required, https://blog.inhq.net/posts/keepkey-CVE-2021-31616/, https://github.com/keepkey/keepkey-firmware/commit/e49d45594002d4d3fbc1f03488e6dfc0a0a65836, https://blog.inhq.net/posts/keepkey-CVE-2021-31616/
