CVE-2021-34693

NameCVE-2021-34693
Descriptionnet/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2713-1, DLA-2714-1, DSA-4941-1
NVD severitylow

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)stretch4.9.228-1vulnerable
stretch (security)4.9.272-2fixed
buster4.19.194-1vulnerable
buster (security)4.19.194-3fixed
bullseye, sid5.10.46-2fixed
linux-4.19 (PTS)stretch (security)4.19.194-3~deb9u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcestretch4.9.272-2DLA-2713-1
linuxsourcebuster4.19.194-3DSA-4941-1
linuxsource(unstable)5.10.46-1
linux-4.19sourcestretch4.19.194-3~deb9u1DLA-2714-1

Notes

https://www.openwall.com/lists/oss-security/2021/06/15/1
https://github.com/nrb547/kernel-exploitation/tree/main/cve-2021-34693
https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/

Search for package or bug name: Reporting problems