In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
2021-08-07T04:15:06.967
2025-05-05T14:12:40.937
Analyzed
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 4.4.276 | Yes |
Operating System | linux | linux_kernel | < 4.9.276 | Yes |
Operating System | linux | linux_kernel | < 4.14.240 | Yes |
Operating System | linux | linux_kernel | < 4.19.198 | Yes |
Operating System | linux | linux_kernel | < 5.4.134 | Yes |
Operating System | linux | linux_kernel | < 5.10.52 | Yes |
Operating System | linux | linux_kernel | < 5.12.19 | Yes |
Operating System | linux | linux_kernel | < 5.13.4 | Yes |
Operating System | netapp | hci_bootstrap_os | - | Yes |
Hardware | netapp | hci_compute_node | - | No |
Application | netapp | hci_management_node | - | Yes |
Application | netapp | solidfire | - | Yes |
Hardware | netapp | hci_storage_node | - | No |
Application | netapp | element_software | - | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |