PT-2024-9882 · Linux+11 · Linux Kernel+11
Hyunwoo Kim
·
Published
2024-10-21
·
Updated
2026-01-15
·
CVE-2024-50264
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
The issue is related to the initialization of a dangling pointer in the vsock/virtio module, potentially leading to a Use-After-Free condition. This could allow an attacker to cause a denial of service or possibly execute arbitrary code. The vulnerability is resolved by initializing the pointer to NULL. It is estimated that over 55.7 million services may be affected. The vulnerability has been exploited in real-world incidents, including a demonstration at Zer0Con 2025 using the kernel-hack-drill open-source project.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
LPE
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Alt Linux
Almalinux
Astra Linux
Centos
Debian
Linuxmint
Linux Kernel
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu