There is a possible UAF due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
                
            References
                    | Link | Resource | 
|---|---|
| https://source.android.com/security/bulletin/pixel/2024-11-01 | Vendor Advisory | 
Configurations
                    History
                    24 Jul 2025, 18:00
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.8 | 
| First Time | Google Google android | |
| CPE | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* | |
| References | () https://source.android.com/security/bulletin/pixel/2024-11-01 - Vendor Advisory | |
| Summary | 
 | 
18 Dec 2024, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-12-18 19:15
Updated : 2025-07-24 18:00
NVD link : CVE-2024-47040
Mitre link : CVE-2024-47040
CVE.ORG link : CVE-2024-47040
JSON object : View
Products Affected
                - android
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
