A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095

Published : 2019-10-11 19:15 Updated : 2019-10-16 17:53

CVSS Score More info
Score 4.6 / 10
Vendor Product Version URI
Google Android - cpe:/o:google:android:-
  1. Google (1) Search CVE
    1. Android (1) Search CVE
      1. -


ID Name Description Links
CWE-416 Use After Free Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. CVE

History of changes

Date Event
2019-10-16 17:53
2019-10-11 19:29