CVE-2021-0920

Published Dec 15, 2021

Last updated 9 months ago

Overview

Description
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel
Source
security@android.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
6.4
Impact score
5.9
Exploitability score
0.5
Vector string
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
6.9
Impact score
10
Exploitability score
3.4
Vector string
AV:L/AC:M/Au:N/C:C/I:C/A:C

Known exploits

Data from CISA

Vulnerability name
Android Kernel Race Condition Vulnerability
Exploit added on
May 23, 2022
Exploit action due
Jun 13, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-362

Social media

Hype score
Not currently trending

Configurations