{"uuid": "7cd41baa-7b9e-4c0d-833e-0ab50d7e2f19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-20421", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1957", "content": "In details slides explaining exploitation of binder kernel use-after-free (UAF) vulnerability in the Android kernel (CVE-2022-20421) to achieves full kernel R/W \nAffected devices: devices running Kernel version 5.4.x and 5.10.x\n\nSlides: https://0xkol.github.io/assets/files/OffensiveCon23_Racing_Against_the_Lock__Exploiting_Spinlock_UAF_in_the_Android_Kernel.pdf\nResearch: https://0xkol.github.io/assets/files/Racing_Against_the_Lock__Exploiting_Spinlock_UAF_in_the_Android_Kernel.pdf\nPoC: https://github.com/0xkol/badspin", "creation_timestamp": "2023-08-22T09:46:34.000000Z"}