PT-2019-3520 · Google+2 · Android+2

Maddie Stone

·

Published

2019-10-04

·

Updated

2026-03-16

·

CVE-2019-2215

CVSS v3.1
7.8
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Android versions prior to the fixed version
Description The issue is related to a use-after-free vulnerability in the Android kernel, specifically in the binder.c driver. This vulnerability allows an elevation of privilege from an application to the Linux kernel, potentially giving an attacker full control over the device. No user interaction is required to exploit this vulnerability, but it does require either the installation of a malicious local application or a separate vulnerability in a network-facing application. There have been reports of malicious apps exploiting this vulnerability, and it has been used in real-world attacks.
Recommendations As a temporary workaround, consider disabling the vulnerable binder.c driver until a patch is available. Restrict access to the vulnerable Linux kernel to minimize the risk of exploitation. Avoid using the
binder
API endpoint until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

LPE

Use After Free

Weakness Enumeration

Related Identifiers

ALSA-2020_0279
ALSA-2025_12746
ALSA-2025_12752
ALSA-2025_12753
ALSA-2025_16880
BDU:2019-03697
CVE-2019-2215
DLA-2068-1
DLA-2114-1
USN-4186-1

Affected Products

Android
Linux Kernel
Ubuntu