{"uuid": "bcc9ed8c-f90e-4edd-ad5b-6b0feb4cdd23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-20421", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1897", "content": "Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel \nThis paper presents an exploit for a unique Binder kernel use-after-free (UAF) vulnerability which was disclosed recently (CVE-2022-20421) \nWrite-up: https://0xkol.github.io/assets/files/Racing_Against_the_Lock__Exploiting_Spinlock_UAF_in_the_Android_Kernel.pdf \nSlides: https://0xkol.github.io/assets/files/OffensiveCon23_Racing_Against_the_Lock__Exploiting_Spinlock_UAF_in_the_Android_Kernel.pdf \nPoC: https://github.com/0xkol/badspin", "creation_timestamp": "2023-07-07T22:16:42.000000Z"}