Use-after-free in Google Android - CVE-2017-11033
Published: December 5, 2017 / Updated: August 8, 2020
Google Android
Detailed vulnerability description
The vulnerability allows a local authenticated user to execute arbitrary code.
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the coresight-tmc driver, a simultaneous read and enable of the ETR device after changing the buffer size may result in a Use After Free condition of the previous buffer.