{"id":"CVE-2020-0305","details":"In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744","modified":"2026-03-14T09:46:07.542105Z","published":"2020-07-17T20:15:11.350Z","related":["ALSA-2020:4431","SUSE-SU-2020:14442-1","SUSE-SU-2020:2102-1","SUSE-SU-2020:2103-1","SUSE-SU-2020:2105-1","SUSE-SU-2020:2106-1","SUSE-SU-2020:2107-1","SUSE-SU-2020:2119-1","SUSE-SU-2020:2121-1","SUSE-SU-2020:2122-1","SUSE-SU-2020:2134-1","SUSE-SU-2020:2152-1","SUSE-SU-2020:2487-1","SUSE-SU-2020:2605-1","openSUSE-SU-2020:1153-1","openSUSE-SU-2020:1236-1","openSUSE-SU-2021:0242-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html"},{"type":"FIX","url":"https://source.android.com/security/bulletin/pixel/2020-06-01"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-0305.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}