drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-38205.json"
[ { "events": [ { "introduced": "0" }, { "fixed": "5.13.3" } ] }, { "events": [ { "introduced": "0" }, { "last_affected": "9.0" } ] } ]