First published: Sun Aug 08 2021(Updated: )
drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <5.13.3 | |
Debian Linux | =9.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38205 is considered a medium severity vulnerability due to its potential to assist attackers in defeating ASLR protections.
To fix CVE-2021-38205, update your Linux kernel to version 5.13.3 or later, or apply the specific patches provided by your distribution.
CVE-2021-38205 affects Linux kernel versions prior to 5.13.3 and specific versions of Debian Linux, including Debian 9.0.
Exploiting CVE-2021-38205 can lead to information disclosure that compromises kernel memory integrity and undermines ASLR protections.
As of now, there are no known public exploits specifically targeting CVE-2021-38205, but the vulnerability poses a risk if left unpatched.