{"id":"CVE-2021-38205","details":"drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).","modified":"2026-04-16T00:03:43.433711313Z","published":"2021-08-08T20:15:07.283Z","related":["SUSE-SU-2021:3177-1","SUSE-SU-2021:3178-1","SUSE-SU-2021:3179-1","SUSE-SU-2021:3205-1","SUSE-SU-2021:3205-2","SUSE-SU-2021:3207-1","openSUSE-SU-2021:1271-1","openSUSE-SU-2021:3179-1","openSUSE-SU-2021:3205-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"},{"type":"FIX","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-38205.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.13.3"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}