Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-0929
HistoryDec 15, 2021 - 12:00 a.m.

CVE-2021-0929

2021-12-1500:00:00
ubuntu.com
ubuntu.com
9

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.3%

In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a
possible way to corrupt memory due to a use after free. This could lead to
local escalation of privilege with no additional execution privileges
needed. User interaction is not needed for exploitation.Product:
AndroidVersions: Android kernelAndroid ID: A-187527909References: Upstream
kernel

Notes

Author Note
alexmurray This vulnerability is within the Ion memory allocator. This code is only present, BUT not enabled, in a limited number of Ubuntu kernels. As such no Ubuntu kernels are affected by this vulnerability.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.3%