{"uuid": "5b12935d-4bdf-4d19-825a-b7500f44ca82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44733", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/143", "content": "CVE-2021-44733: Fuzzing and exploitation of a use-after-free in the Linux kernel TEE subsystem\n\nAn article about a bug in the Trusted Execution Environment subsystem. By Patrik Lantz.\n\nThe bug was found by syzkaller; descriptions are included in the article. An exploit for controlling PC is also provided along with instructions for reproducing. The exploit does not bypass PAN.", "creation_timestamp": "2021-12-28T16:53:13.000000Z"}