net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/06/15/1 | Exploit Mailing List Patch Third Party Advisory |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5e87ddbe3942e27e939bdc02deb8579b0cbd8ecc | |
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html | Mailing List Third Party Advisory |
https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076%403c-app-gmx-bs04/T/ | |
https://www.debian.org/security/2021/dsa-4941 | Third Party Advisory |
Configurations
History
25 Mar 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Sep 2021, 13:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
|
References |
|
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html - Mailing List, Third Party Advisory |
21 Jul 2021, 15:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Jun 2021, 18:05
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-909 | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/06/15/1 - Exploit, Mailing List, Patch, Third Party Advisory | |
References | (MISC) https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/ - Exploit, Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
16 Jun 2021, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Jun 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-14 22:15
Updated : 2024-03-25 01:15
NVD link : CVE-2021-34693
Mitre link : CVE-2021-34693
CVE.ORG link : CVE-2021-34693
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-909
Missing Initialization of Resource