CVE-2021-34693

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

25 Mar 2024, 01:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5e87ddbe3942e27e939bdc02deb8579b0cbd8ecc -

07 Nov 2023, 03:36

Type Values Removed Values Added
References
  • {'url': 'https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/', 'name': 'https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/', 'tags': ['Exploit', 'Patch', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076%403c-app-gmx-bs04/T/ -

20 Sep 2021, 13:52

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4941 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html - Mailing List, Third Party Advisory

21 Jul 2021, 15:16

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html -

21 Jun 2021, 18:05

Type Values Removed Values Added
References (MISC) https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/ - (MISC) https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/ - Exploit, Patch, Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/06/15/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/06/15/1 - Exploit, Mailing List, Patch, Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-909
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5

16 Jun 2021, 00:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/06/15/1 -

14 Jun 2021, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-14 22:15

Updated : 2024-03-25 01:15


NVD link : CVE-2021-34693

Mitre link : CVE-2021-34693

CVE.ORG link : CVE-2021-34693


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-909

Missing Initialization of Resource