{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T15:04:39.790","vulnerabilities":[{"cve":{"id":"CVE-2021-0947","sourceIdentifier":"security@android.com","published":"2022-08-24T14:15:09.347","lastModified":"2024-11-21T05:43:17.857","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The method PVRSRVBridgeTLDiscoverStreams allocates puiStreamsInt on the heap, fills the contents of the buffer via TLServerDiscoverStreamsKM, and then copies the buffer to userspace. The method TLServerDiscoverStreamsKM may fail for several reasons including invalid sizes. If this method fails the buffer will be left uninitialized and despite the error will still be copied to userspace. Kernel leak of uninitialized heap data with no privs required.Product: AndroidVersions: Android SoCAndroid ID: A-236838960"},{"lang":"es","value":"El método PVRSRVBridgeTLDiscoverStreams asigna puiStreamsInt en el heap, llena el contenido del buffer por medio de TLServerDiscoverStreamsKM, y luego copia el buffer al espacio de usuario. El método TLServerDiscoverStreamsKM puede fallar por varias razones, incluyendo tamaños no válidos. Si este método falla, el búfer se dejará sin inicializar y, a pesar del error, seguirá copiándose en el espacio de usuario. Filtración en el kernel de datos de la pila no inicializados sin ser requeridos privilegios. Producto: Android, Versiones: Android SoC, ID de Android: A-236838960"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-909"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","matchCriteriaId":"F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"}]}]}],"references":[{"url":"https://source.android.com/security/bulletin/2022-08-01","source":"security@android.com","tags":["Vendor Advisory"]},{"url":"https://source.android.com/security/bulletin/2022-08-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}