First published: Mon Feb 06 2023(Updated: )
In binder_transaction_buffer_release of binder.c, there is a possible use after free due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257685302References: Upstream kernel
Credit: security@android.com security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20938 has been classified as a vulnerability that enables local escalation of privilege.
To fix CVE-2023-20938, ensure you update to the latest release of the Android kernel available from Google.
No, no user interaction is required for exploitation of CVE-2023-20938.
CVE-2023-20938 affects various versions of Google Android but specific versions include those listed under the Debian package remedy.
Exploitation of CVE-2023-20938 could lead to an attacker gaining elevated privileges on the affected device.