drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2785-1 | linux-4.19 security update |
Debian DLA |
DLA-2843-1 | linux security update |
EUVD |
EUVD-2021-24663 | drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer). |
Ubuntu USN |
USN-5092-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5092-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5094-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5094-2 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-5096-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5115-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5116-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5116-2 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T01:37:16.321Z
Reserved: 2021-08-08T00:00:00
Link: CVE-2021-38205
No data.
Status : Modified
Published: 2021-08-08T20:15:07.283
Modified: 2024-11-21T06:16:39.483
Link: CVE-2021-38205
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN