CVE-2021-0929Use After Free in Google Android

CWE-416Use After Free8 documents7 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 85.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 15
Latest updateMar 14

Description

In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-187527909References: Upstream kernel

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Debianlinux/linux_kernel< 5.6.4-1+3
debiandebian/linux< linux 5.6.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-g4fj-qffq-f9vx: In ion_dma_buf_end_cpu_access and related functions of ion2021-12-16
OSV
CVE-2021-0929: In ion_dma_buf_end_cpu_access and related functions of ion2021-12-15
OSV
CVE-2021-0929: In ion_dma_buf_end_cpu_access and related functions of ion2021-11-01

📋Vendor Advisories

4
CISA ICS
Siemens SIMATIC2024-03-14
Android
CVE-2021-0929: ION2021-11-01
Red Hat
kernel: use-after-free in ion_dma_buf_end_cpu_access and related functions in ion.c2021-07-28
Debian
CVE-2021-0929: linux - In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possibl...2021
CVE-2021-0929 — Use After Free in Google Android | cvebase