CVE-2024-50264Use After Free in Linux

CWE-416Use After Free60 documents10 sources
Severity
7.8HIGHNVD
OSV8.8OSV5.5OSV4.7
EPSS
0.0%
top 88.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 19
Latest updateAug 14

Description

In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages14 packages

Patches

🔴Vulnerability Details

29
OSV
linux-iot vulnerabilities2025-04-03
OSV
CVE-2024-50264: In virtio_transport_destruct of virtio_transport_common2025-04-01
OSV
Kernel Live Patch Security Notice2025-02-20
OSV
linux-xilinx-zynqmp vulnerabilities2025-01-27
OSV
linux-raspi-5.4 vulnerabilities2025-01-15

📋Vendor Advisories

30
CISA ICS
Siemens Third-Party Components in SINEC OS2025-08-14
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2024-502642025-04-29
Ubuntu
Linux kernel (IoT) vulnerabilities2025-04-03
Android
CVE-2024-50264: Net2025-04-01
Ubuntu
Kernel Live Patch Security Notice2025-02-20
CVE-2024-50264 — Use After Free in Linux | cvebase