{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T07:02:05.092","vulnerabilities":[{"cve":{"id":"CVE-2021-0946","sourceIdentifier":"security@android.com","published":"2022-08-24T14:15:09.197","lastModified":"2024-11-21T05:43:17.393","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The method PVRSRVBridgePMRPDumpSymbolicAddr allocates puiMemspaceNameInt on the heap, fills the contents of the buffer via PMR_PDumpSymbolicAddr, and then copies the buffer to userspace. The method PMR_PDumpSymbolicAddr may fail, and if it does the buffer will be left uninitialized and despite the error will still be copied to userspace. Kernel leak of uninitialized heap data with no privs required.Product: AndroidVersions: Android SoCAndroid ID: A-236846966"},{"lang":"es","value":"El método PVRSRVBridgePMRPDumpSymbolicAddr asigna puiMemspaceNameInt en la pila, llena el contenido del búfer por medio de PMR_PDumpSymbolicAddr y luego copia el búfer al espacio de usuario. El método PMR_PDumpSymbolicAddr puede fallar, y si lo hace, el búfer será dejado sin inicializar y, a pesar del error, seguirá copiándose al espacio de usuario. Filtración en el kernel de datos de la pila no inicializados sin ser requeridos privilegios. Producto: Android, Versiones: Android SoC, ID de Android: A-236846966"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-909"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","matchCriteriaId":"F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"}]}]}],"references":[{"url":"https://source.android.com/security/bulletin/2022-08-01","source":"security@android.com","tags":["Vendor Advisory"]},{"url":"https://source.android.com/security/bulletin/2022-08-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}