First published: Mon Oct 03 2022(Updated: )
In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20421 is a medium severity vulnerability that allows local escalation of privilege due to a use after free error.
To mitigate CVE-2022-20421, update your system to the latest kernel versions specified by your Linux distribution.
CVE-2022-20421 affects users of Android and specific Debian Linux versions, particularly 10.0 and 11.0.
CVE-2022-20421 impacts devices running the Google Android kernel and certain Debian-based systems.
No, user interaction is not required to exploit CVE-2022-20421, making it potentially more dangerous.