{"id":"CVE-2020-0427","details":"In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171","modified":"2026-03-15T22:30:04.175531Z","published":"2020-09-17T19:15:12.877Z","related":["ALSA-2021:4356","SUSE-SU-2020:2879-1","SUSE-SU-2020:2904-1","SUSE-SU-2020:2905-1","SUSE-SU-2020:2906-1","SUSE-SU-2020:2907-1","SUSE-SU-2020:2908-1","SUSE-SU-2020:2999-1","SUSE-SU-2020:3014-1","SUSE-SU-2020:3501-1","SUSE-SU-2020:3503-1","SUSE-SU-2020:3532-1","SUSE-SU-2020:3544-1","openSUSE-SU-2020:1586-1","openSUSE-SU-2020:1655-1","openSUSE-SU-2021:0242-1"],"references":[{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html"},{"type":"ADVISORY","url":"https://www.starwindsoftware.com/security/sw-20210325-0005/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html"},{"type":"FIX","url":"https://source.android.com/security/bulletin/pixel/2020-09-01"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"0"},{"last_affected":"v8-build12533"}]},{"events":[{"introduced":"0"},{"last_affected":"v8-build12658"}]},{"events":[{"introduced":"0"},{"last_affected":"v8-build12859"}]},{"events":[{"introduced":"0"},{"last_affected":"v8-build13170"}]},{"events":[{"introduced":"0"},{"last_affected":"v8-build13586"}]},{"events":[{"introduced":"0"},{"last_affected":"v8-build13861"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-0427.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}