A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2019/CVE-2019-2215.html
https://usn.ubuntu.com/4186-1/
https://source.android.com/security/bulletin/2019-10-01
https://security.netapp.com/advisory/ntap-20191031-0005/
https://seclists.org/bugtraq/2019/Nov/11
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en
http://seclists.org/fulldisclosure/2019/Oct/38
http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html
http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html