CVE-2021-39800Use After Free in Google Android

CWE-416Use After Free6 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 92.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 12
Latest updateApr 13

Description

In ion_ioctl of ion-ioctl.c, there is a possible way to leak kernel head data due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208277166References: Upstream kernel

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

debiandebian/linux

Patches

🔴Vulnerability Details

3
GHSA
GHSA-w3v8-rrpc-q26v: In ion_ioctl of ion-ioctl2022-04-13
OSV
CVE-2021-39800: In ion_ioctl of ion-ioctl2022-04-12
OSV
CVE-2021-39800: In ion_ioctl of ion-ioctl2022-04-01

📋Vendor Advisories

2
Android
CVE-2021-39800: ION2022-04-01
Debian
CVE-2021-39800: linux - In ion_ioctl of ion-ioctl.c, there is a possible way to leak kernel head data du...2021
CVE-2021-39800 — Use After Free in Google Android | cvebase