{"id":"CVE-2021-34693","details":"net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.","modified":"2026-03-13T05:00:16.935083Z","published":"2021-06-14T22:15:20.820Z","related":["MGASA-2021-0295","MGASA-2021-0296","SUSE-SU-2021:14764-1","SUSE-SU-2021:2303-1","SUSE-SU-2021:2305-1","SUSE-SU-2021:2321-1","SUSE-SU-2021:2324-1","SUSE-SU-2021:2325-1","SUSE-SU-2021:2349-1","SUSE-SU-2021:2352-1","SUSE-SU-2021:2406-1","SUSE-SU-2021:2421-1","SUSE-SU-2021:2422-1","SUSE-SU-2021:2426-1","SUSE-SU-2021:2427-1","SUSE-SU-2021:2451-1","openSUSE-SU-2021:2305-1","openSUSE-SU-2021:2352-1","openSUSE-SU-2021:2427-1"],"references":[{"type":"WEB","url":"https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076%403c-app-gmx-bs04/T/"},{"type":"WEB","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5e87ddbe3942e27e939bdc02deb8579b0cbd8ecc"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4941"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2021/06/15/1"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"2.6.25"},{"last_affected":"5.12.10"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-34693.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}