First published: Mon Mar 04 2019(Updated: )
In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2024 has a severity that allows for local escalation of privilege due to a use after free vulnerability.
To fix CVE-2019-2024, users should update to the patched versions of the Linux kernel such as 5.10.223-1, 5.10.226-1, or the 6.x series.
CVE-2019-2024 affects various versions of Google Android kernel and is associated with the em28xx driver.
No, user interaction is not needed for the exploitation of CVE-2019-2024.
Exploiting CVE-2019-2024 can lead to local escalation of privilege on affected Android devices.