Unrated severityCISA KEVNVD Advisory· Published Oct 11, 2019· Updated Oct 21, 2025
CVE-2019-2215
CVE-2019-2215
Description
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
Affected products
1- Google/Androiddescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- usn.ubuntu.com/4186-1/mitrevendor-advisoryx_refsource_UBUNTU
- packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.htmlmitrex_refsource_MISC
- seclists.org/fulldisclosure/2019/Oct/38mitremailing-listx_refsource_FULLDISC
- www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-enmitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2020/01/msg00013.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2020/03/msg00001.htmlmitremailing-listx_refsource_MLIST
- seclists.org/bugtraq/2019/Nov/11mitremailing-listx_refsource_BUGTRAQ
- security.netapp.com/advisory/ntap-20191031-0005/mitrex_refsource_CONFIRM
- source.android.com/security/bulletin/2019-10-01mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.