2024-07-14 02:06:08 +00:00

80 lines
2.7 KiB
JSON

{
"id": "CVE-2021-0946",
"sourceIdentifier": "security@android.com",
"published": "2022-08-24T14:15:09.197",
"lastModified": "2023-08-08T14:21:49.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The method PVRSRVBridgePMRPDumpSymbolicAddr allocates puiMemspaceNameInt on the heap, fills the contents of the buffer via PMR_PDumpSymbolicAddr, and then copies the buffer to userspace. The method PMR_PDumpSymbolicAddr may fail, and if it does the buffer will be left uninitialized and despite the error will still be copied to userspace. Kernel leak of uninitialized heap data with no privs required.Product: AndroidVersions: Android SoCAndroid ID: A-236846966"
},
{
"lang": "es",
"value": "El m\u00e9todo PVRSRVBridgePMRPDumpSymbolicAddr asigna puiMemspaceNameInt en la pila, llena el contenido del b\u00fafer por medio de PMR_PDumpSymbolicAddr y luego copia el b\u00fafer al espacio de usuario. El m\u00e9todo PMR_PDumpSymbolicAddr puede fallar, y si lo hace, el b\u00fafer ser\u00e1 dejado sin inicializar y, a pesar del error, seguir\u00e1 copi\u00e1ndose al espacio de usuario. Filtraci\u00f3n en el kernel de datos de la pila no inicializados sin ser requeridos privilegios. Producto: Android, Versiones: Android SoC, ID de Android: A-236846966"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-909"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2022-08-01",
"source": "security@android.com",
"tags": [
"Vendor Advisory"
]
}
]
}