{ "schema_version": "1.4.0", "id": "GHSA-mv45-h347-p3mv", "modified": "2022-05-24T19:10:23Z", "published": "2022-05-24T19:10:23Z", "aliases": [ "CVE-2021-38205" ], "details": "drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38205" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37" }, { "type": "WEB", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html" } ], "database_specific": { "cwe_ids": [ "CWE-824" ], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-08-08T20:15:00Z" } }