drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-38205.json"
[
{
"digest": {
"line_hashes": [
"113464026039062204109113522305922179763",
"65351856959366629636575338312577862513",
"197143001769947518311220741442460078960",
"324758327215170537074652676849093397573",
"335660151101416027399049342798657148401",
"63383020833248367203360173586033232735"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/xilinx/xilinx_emaclite.c"
},
"signature_type": "Line",
"id": "CVE-2021-38205-2afc4b52",
"source": "https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37",
"deprecated": false
},
{
"digest": {
"function_hash": "106954907146401743532319054532948507430",
"length": 2012.0
},
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/xilinx/xilinx_emaclite.c",
"function": "xemaclite_of_probe"
},
"signature_type": "Function",
"id": "CVE-2021-38205-ad622efd",
"source": "https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37",
"deprecated": false
}
]