In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50264.json"
}[
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"93977310876986077576665763442512925816",
"163800357948092888600624900561682532725",
"136815264389493747422028697590892460623",
"163716186038971930399625291126554016251"
]
},
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-50264-3defa2e7",
"target": {
"file": "net/vmw_vsock/virtio_transport_common.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@44d29897eafd0e1196453d3003a4d5e0b968eeab"
},
{
"digest": {
"length": 86.0,
"function_hash": "29489074915205943468631857696750719064"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2024-50264-c2c40ecf",
"target": {
"function": "virtio_transport_destruct",
"file": "net/vmw_vsock/virtio_transport_common.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@44d29897eafd0e1196453d3003a4d5e0b968eeab"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50264.json"