First published: Wed Jul 05 2023(Updated: )
In multiple functions of binder.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | ||
Debian Linux | =10.0 | |
Debian Linux | =11.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21255 has a high severity level due to its potential for local escalation of privileges.
To fix CVE-2023-21255, update to the patched versions of the linux package: 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.128-1, 6.12.12-1, or 6.12.13-1.
CVE-2023-21255 affects Google Android and specific versions of Debian GNU/Linux, notably versions 10.0 and 11.0.
No, user interaction is not needed for the exploitation of CVE-2023-21255, making it more severe.
CVE-2023-21255 is a memory corruption vulnerability resulting from a use after free issue.