CVE-2022-20421Use After Free in Google Android

CWE-416Use After Free32 documents9 sources
Severity
7.8HIGHNVD
OSV5.5OSV4.4
EPSS
6.3%
top 8.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 11
Latest updateApr 13

Description

In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

Debianlinux/linux_kernel< 5.10.149-1+3
Ubuntulinux/linux_kernel< 4.15.0-201.212+2
debiandebian/linux< linux 5.19.11-1 (bookworm)

Also affects: Debian Linux 10.0, 11.0

Patches

🔴Vulnerability Details

13
VulDB
Google Android binder.c binder_inc_ref_for_node use after free (A-239630375 / EUVD-2022-25681)2026-04-13
VulDB
Google Android use after free (A-239630375 / EUVD-2022-25681)2026-04-13
OSV
linux-gke-5.15 vulnerabilities2023-02-15
OSV
linux-bluefield vulnerabilities2023-01-19
OSV
linux-azure-5.4, linux-azure-fde vulnerabilities2023-01-10

📋Vendor Advisories

18
CISA ICS
Siemens SIMATIC2024-03-14
CISA ICS
Siemens SIMATIC S7-1500 TM MFP BIOS2023-06-15
CISA ICS
Siemens SIMATIC S7-1500 TM MFP Linux Kernel2023-06-15
Ubuntu
Linux kernel (GKE) vulnerabilities2023-02-15
Ubuntu
Linux kernel (BlueField) vulnerabilities2023-01-19