In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
| Software | From | Fixed in |
|---|---|---|
| debian / debian_linux | 9.0 | 9.0.x |
| debian / debian_linux | 10.0 | 10.0.x |
| redhat / enterprise_linux | 8.0 | 8.0.x |
| linux / linux_kernel | 5.5 | 5.10.52 |
| linux / linux_kernel | 5.11 | 5.12.19 |
| linux / linux_kernel | 5.13 | 5.13.4 |
| linux / linux_kernel | 4.5 | 4.9.276 |
| linux / linux_kernel | 4.10 | 4.14.240 |
| linux / linux_kernel | 4.15 | 4.19.198 |
| linux / linux_kernel | 4.20 | 5.4.134 |
| linux / linux_kernel | 2.6.24 | 4.4.276 |