A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
- http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html
- https://github.com/0xT11/CVE-POC
- https://github.com/0xbinder/android-kernel-exploitation-lab
- https://github.com/0xor0ne/awesome-list
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ATorNinja/CVE-2019-2215
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/Bariskizilkaya/Android-kernel-emulation-with-QEMU
- https://github.com/BlackTom900131/awesome-game-security
- https://github.com/Byte-Master-101/CVE-2019-2215
- https://github.com/Clock-Skew/EndPointX
- https://github.com/CrackerCat/Rootsmart-v2.0
- https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
- https://github.com/DimitriFourny/cve-2019-2215
- https://github.com/DuncanParSky/awesome-android-root-exploits
- https://github.com/GiorgosXou/Our-Xiaomi-Redmi-5A-riva-debloating-list
- https://github.com/HacTF/poc--exp
- https://github.com/IamAlch3mist/Awesome-Android-Vulnerability-Research
- https://github.com/Jalexander798/JA_Tools-Cybersecurity-Resource-2
- https://github.com/Joseph-CHC/reseach_list
- https://github.com/Karma2424/cve2019-2215-3.18
- https://github.com/LIznzn/CVE-2019-2215
- https://github.com/MrAgrippa/nes-01
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Panopticon-Project/panopticon-APT-C-35
- https://github.com/Panopticon-Project/panopticon-Donot
- https://github.com/Panopticon-Project/panopticon-Sidewinder
- https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker
- https://github.com/R0rt1z2/huawei-unlock
- https://github.com/SteveZMTstudios/sharepoint
- https://github.com/Stoobyy/Kyocera-A101BM-Exploitation
- https://github.com/Thehepta/android-jailbreak
- https://github.com/XiaozaYa/CVE-2019-2215
- https://github.com/aguerriero1998/Umass-CS-590J-Capstone-Project
- https://github.com/alphaSeclab/sec-daily-2019
- https://github.com/avboy1337/Vulnerabilities
- https://github.com/bachkhoasoft/awesome-list-ks
- https://github.com/bb33bb/Vulnerabilities
- https://github.com/c3r34lk1ll3r/CVE-2019-2215
- https://github.com/cutesmilee/pocs
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/eeenvik1/scripts_for_YouTrack
- https://github.com/elbiazo/CVE-2019-2215
- https://github.com/enceka/1
- https://github.com/enceka/SharpS1GetRoot
- https://github.com/enceka/cve-2019-2215-3.18
- https://github.com/fei9747/LinuxEelvation
- https://github.com/frankzappasmustache/starred-repos
- https://github.com/gmh5225/awesome-game-security
- https://github.com/grant-h/qu1ckr00t
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/jpacg/awesome-stars
- https://github.com/jsirichai/CVE-2019-2215
- https://github.com/kangtastic/cve-2019-2215
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/khnhdz/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/llccd/TempRoot-Huawei
- https://github.com/locus-x64/android-kernel-exploitation-lab
- https://github.com/marcinguy/CVE-2019-2215
- https://github.com/mouseos/cve-2019-2215_SH-M08
- https://github.com/mufidmb38/CVE-2019-2215
- https://github.com/mutur4/CVE-2019-2215
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nicchongwb/Rootsmart-v2.0
- https://github.com/nighthawkk/Binary-Kernel-Android-Exploitation-Roadmap
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pengusec/awesome-netsec-articles
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/qre0ct/android-kernel-exploitation-ashfaq-CVE-2019-2215
- https://github.com/raymontag/CVE-2019-2215
- https://github.com/raystyle/CVE-2019-2215
- https://github.com/robertfischman/game-security
- https://github.com/saga0324/android_device_sharp_sh8996
- https://github.com/sharif-dev/AndroidKernelVulnerability
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/stevejubx/CVE-2019-2215
- https://github.com/su-vikas/Mobile-Attack-Vectors
- https://github.com/tdcoming/Vulnerability-engine
- https://github.com/themmokhtar/CVE-2020-0022
- https://github.com/timwr/CVE-2019-2215
- https://github.com/trevor0106/game-security
- https://github.com/wateroot/poc-exp
- https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/wrlu/Vulnerabilities
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/yud121212/Linux_Privilege_Escalation