Description
In code generated by BuildParcelFields of generate_cpp.cpp, there is a possible way for a crafted parcelable to reveal uninitialized memory of a target process due to uninitialized data. This could lead to local information disclosure across Binder transactions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-198346478
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-3585 | In code generated by BuildParcelFields of generate_cpp.cpp, there is a possible way for a crafted parcelable to reveal uninitialized memory of a target process due to uninitialized data. This could lead to local information disclosure across Binder transactions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-198346478 |
References
| Link | Providers |
|---|---|
| https://source.android.com/security/bulletin/2021-12-01 |
|
History
No history.
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-08-03T15:55:17.941Z
Reserved: 2020-11-06T00:00:00.000Z
Link: CVE-2021-0966
No data.
Status : Modified
Published: 2021-12-15T19:15:11.997
Modified: 2024-11-21T05:43:19.470
Link: CVE-2021-0966
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD