CVE-2024-50264

Published Nov 19, 2024

Last updated 4 months ago

CVSS high 7.8
Linux Kernel

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2024-50264 is a vulnerability in the Linux kernel, specifically within the vsock/virtio subsystem. It arises from a dangling pointer issue during loopback communication. A dangling pointer can be created in `vsk->trans`, potentially leading to a Use-After-Free condition. The vulnerability occurs because the `vsk->trans` pointer is not properly initialized. The fix involves initializing `vsk->trans` to NULL, which prevents the use of the dangling pointer and resolves the Use-After-Free condition.

Description
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.
Source
416baaa9-dc9f-4396-8d5f-8c081fb06d67
NVD status
Modified

Risk scores

CVSS 3.1

Type
Primary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

nvd@nist.gov
CWE-416
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-416

Social media

Hype score
Not currently trending
  1. 🇰🇷 Our researcher @a13xp0p0v spoke at #Zer0Con2025 in Seoul, describing his experiments with CVE-2024-50264 in the Linux kernel involving his toolkit kernel-hack-drill. Huge respect 👏 Until next time! #LinuxSecurity https://t.co/Gebwo88bYy

    @PTsecurity_EN

    16 Apr 2025

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Slides of my talk at #Zer0Con2025! ⚡️ Kernel-Hack-Drill: Environment For Developing Linux Kernel Exploits ⚡️ I presented the kernel-hack-drill open-source project and showed how it helped me to exploit CVE-2024-50264 in the Linux kernel. Enjoy! https://t.co/84DqT4rdvm https://

    @a13xp0p0v

    14 Apr 2025

    9680 Impressions

    70 Retweets

    232 Likes

    107 Bookmarks

    3 Replies

    2 Quotes

  3. kernelCTF VSock 0-day write-up by @v4bel @_qwerty_po (exp196/exp197, CVE-2024-50264) https://t.co/ChTa7JC8PR

    @alexjplaskett

    20 Jan 2025

    3205 Impressions

    8 Retweets

    87 Likes

    31 Bookmarks

    0 Replies

    0 Quotes

  4. kernelCTF VSock 0-day: CVE-2024-50264 by @v4bel and @_qwerty_po https://t.co/ChTa7JCGFp

    @alexjplaskett

    6 Jan 2025

    4465 Impressions

    22 Retweets

    105 Likes

    54 Bookmarks

    3 Replies

    0 Quotes

  5. I just released our kernelCTF VSock 0-day write-up with @_qwerty_po . (exp196/exp197, CVE-2024-50264) https://t.co/8UpGrVcDFF We made history by being the first to exploit VSock in kernelCTF, expanding its known attack vectors. 🥳 It’s a pretty *simple* race condition, right? h

    @v4bel

    19 Dec 2024

    12731 Impressions

    46 Retweets

    193 Likes

    85 Bookmarks

    6 Replies

    3 Quotes

  6. CVE-2024-50264 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback com… https://t.co/8odlWu3zoz

    @CVEnew

    19 Nov 2024

    557 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations