CVE-2021-34693

NameCVE-2021-34693
Descriptionnet/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2713-1, DLA-2714-1, DSA-4941-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)buster4.19.249-2fixed
buster (security)4.19.304-1fixed
bullseye5.10.209-2fixed
bullseye (security)5.10.205-2fixed
bookworm6.1.76-1fixed
bookworm (security)6.1.69-1fixed
trixie6.6.15-2fixed
sid6.7.9-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcestretch4.9.272-2DLA-2713-1
linuxsourcebuster4.19.194-3DSA-4941-1
linuxsource(unstable)5.10.46-1
linux-4.19sourcestretch4.19.194-3~deb9u1DLA-2714-1

Notes

https://www.openwall.com/lists/oss-security/2021/06/15/1
https://github.com/nrb547/kernel-exploitation/tree/main/cve-2021-34693
https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/

Search for package or bug name: Reporting problems