Description
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2785-1 | linux-4.19 security update |
Debian DLA |
DLA-2843-1 | linux security update |
Debian DSA |
DSA-4978-1 | linux security update |
Ubuntu USN |
USN-5073-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5073-2 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-5073-3 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-5091-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5091-2 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-5092-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5092-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5096-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5106-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5343-1 | Linux kernel vulnerabilities |
References
History
No history.
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T01:37:16.213Z
Reserved: 2021-08-07T00:00:00.000Z
Link: CVE-2021-38160
No data.
Status : Analyzed
Published: 2021-08-07T04:15:06.967
Modified: 2025-05-05T14:12:40.937
Link: CVE-2021-38160
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN