Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-34693

Опубликовано: 14 июн. 2021
Источник: debian
EPSS Низкий

Описание

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.10.46-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2021/06/15/1

  • https://github.com/nrb547/kernel-exploitation/tree/main/cve-2021-34693

  • https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/

EPSS

Процентиль: 15%
0.00048
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 4 лет назад

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.

CVSS3: 4
redhat
около 4 лет назад

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.

CVSS3: 5.5
nvd
около 4 лет назад

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.

CVSS3: 5.5
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 5.5
github
около 3 лет назад

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.

EPSS

Процентиль: 15%
0.00048
Низкий