Use-after-free vulnerability in ip_check_mc_rcu in igmp.c allows local users to gain privileges via crafted system calls that trigger IGMP membership updates in incorrect situations.

Use-after-free vulnerability in ip_check_mc_rcu in igmp.c allows local users to gain privileges via crafted system calls that trigger IGMP membership updates in incorrect situations.

CVE-2022-20141 · HIGH Severity

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel

Learn more about our Cis Benchmark Audit For Google Android.