A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095 Upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/android/binder.c?h=linux-4.14.y&id=7a3cee43e935b9d526ad07f20bf005ba7e74d05b References: https://seclists.org/fulldisclosure/2019/Oct/38 https://github.com/marcinguy/CVE-2019-2215/ https://bugs.chromium.org/p/project-zero/issues/detail?id=1942
Mitigation: There is no mitigation required for this flaw as it does not affect shipping Red Hat Enterprise Linux kernels.