Published: 07/08/2021 Updated: 01/01/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel prior to 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

netapp hci_bootstrap_os -

netapp hci management node -

netapp solidfire -

netapp element_software -

debian debian linux 9.0

debian debian linux 10.0

redhat enterprise linux 8.0

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2020-3702 A flaw was found in the driver for Atheros IEEE 80211n family of chipsets (ath9k) allowing information disclosure CVE-2020-16119 Hadar Manor reported a use-after-free in the D ...

Github Repositories

CVE Diff Checker diff checker主要思路是使用历史diff代码到二次开发的项目里面匹配对应的补丁是否被修改 用法: python /mainpy 你的项目代码路径 比如说项目组引入Qemu作为第三方库,然后要快速检测该版本的Qemu源码存在哪些漏洞: python /mainpy /qemu-source-521