In code generated by BuildParcelFields of generate_cpp.cpp, there is a possible way for a crafted parcelable to reveal uninitialized memory of a target process due to uninitialized data. This could lead to local information disclosure across Binder transactions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-198346478
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://source.android.com/security/bulletin/2021-12-01 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: google_android
Published: 2021-12-15T18:05:48
Updated: 2024-08-03T15:55:17.941Z
Reserved: 2020-11-06T00:00:00
Link: CVE-2021-0966
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2021-12-15T19:15:11.997
Modified: 2022-07-12T17:42:04.277
Link: CVE-2021-0966
Redhat
No data.