Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-38160

Опубликовано: 03 июл. 2021
Источник: redhat
CVSS3: 0
EPSS Низкий

Описание

In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior

This CVE is being DISPUTED () by Red Hat with a note that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior. () https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160

Отчет

Red Hat Product Security does not consider this to be a vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelWill not fix
Red Hat Enterprise Linux 7kernel-altOut of support scope
Red Hat Enterprise Linux 7kernel-rtWill not fix
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected

Показывать по

Дополнительная информация

Дефект:
CWE-20->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1991722kernel: data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c

EPSS

Процентиль: 3%
0.00017
Низкий

0 Low

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 4 года назад

** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.

CVSS3: 7.8
nvd
почти 4 года назад

In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior

CVSS3: 7.8
debian
почти 4 года назад

In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, da ...

CVSS3: 7.8
github
около 3 лет назад

In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size.

CVSS3: 7.8
fstec
почти 4 года назад

Уязвимость драйвера drivers/char/virtio_console.c ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение стека

EPSS

Процентиль: 3%
0.00017
Низкий

0 Low

CVSS3