Executive Summary

Informations
Name CVE-2021-46935 First vendor Publication 2024-02-27
Vendor Cve Last vendor Modification 2024-04-10

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact None Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

binder: fix async_free_space accounting for empty parcels

In 4.13, commit 74310e06be4d ("android: binder: Move buffer out of area shared with user space") fixed a kernel structure visibility issue. As part of that patch, sizeof(void *) was used as the buffer size for 0-length data payloads so the driver could detect abusive clients sending 0-length asynchronous transactions to a server by enforcing limits on async_free_size.

Unfortunately, on the "free" side, the accounting of async_free_space did not add the sizeof(void *) back. The result was that up to 8-bytes of async_free_space were leaked on every async transaction of 8-bytes or less. These small transactions are uncommon, so this accounting issue has gone undetected for several years.

The fix is to use "buffer_size" (the allocated buffer size) instead of "size" (the logical buffer size) when updating the async_free_space during the free operation. These are the same except for this corner case of asynchronous transactions with payloads < 8 bytes.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46935

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-668 Exposure of Resource to Wrong Sphere

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3470

Sources (Detail)

https://git.kernel.org/stable/c/103b16a8c51f96d5fe063022869ea906c256e5da
https://git.kernel.org/stable/c/17691bada6b2f1d5f1c0f6d28cd9d0727023b0ff
https://git.kernel.org/stable/c/1cb8444f3114f0bb2f6e3bcadcf09aa4a28425d4
https://git.kernel.org/stable/c/2d2df539d05205fd83c404d5f2dff48d36f9b495
https://git.kernel.org/stable/c/7c7064402609aeb6fb11be1b4ec10673ff17b593
https://git.kernel.org/stable/c/cfd0d84ba28c18b531648c9d4a35ecca89ad9901
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Date Informations
2024-11-21 21:24:26
  • Multiple Updates
2024-11-14 02:31:30
  • Multiple Updates
2024-11-09 02:32:15
  • Multiple Updates
2024-10-26 02:30:14
  • Multiple Updates
2024-10-25 02:31:55
  • Multiple Updates
2024-10-23 02:31:20
  • Multiple Updates
2024-10-03 02:27:51
  • Multiple Updates
2024-10-02 02:26:17
  • Multiple Updates
2024-09-04 02:25:49
  • Multiple Updates
2024-08-22 02:24:19
  • Multiple Updates
2024-08-02 13:30:43
  • Multiple Updates
2024-08-02 01:27:16
  • Multiple Updates
2024-04-11 00:27:53
  • Multiple Updates
2024-02-27 17:27:28
  • Multiple Updates
2024-02-27 13:27:25
  • First insertion