In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-38160.json"
[
{
"id": "CVE-2021-38160-05f3b58e",
"target": {
"file": "drivers/char/virtio_console.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46",
"digest": {
"threshold": 0.9,
"line_hashes": [
"195362040112664097425367568813381090287",
"294500444727360624086595694464301006061",
"332693137376405820545055837063369286972",
"233484141920254455615093510129482763400",
"277125330095538739833328335747187820081",
"191470994714094816288619667126136557038",
"31383372575001076755560809231582600185",
"55476586781357655623533534113610196149"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2021-38160-0eca7e4e",
"target": {
"function": "get_inbuf",
"file": "drivers/char/virtio_console.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46",
"digest": {
"function_hash": "75161918258965457135294462775099465414",
"length": 278.0
},
"signature_type": "Function"
},
{
"id": "CVE-2021-38160-42753f4b",
"target": {
"function": "control_work_handler",
"file": "drivers/char/virtio_console.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46",
"digest": {
"function_hash": "202670989844150806004207007092522554445",
"length": 593.0
},
"signature_type": "Function"
}
]