AI description
CVE-2024-50264 is a vulnerability in the Linux kernel, specifically within the vsock/virtio subsystem. It arises from a dangling pointer issue during loopback communication. A dangling pointer can be created in `vsk->trans`, potentially leading to a Use-After-Free condition. The vulnerability occurs because the `vsk->trans` pointer is not properly initialized. The fix involves initializing `vsk->trans` to NULL, which prevents the use of the dangling pointer and resolves the Use-After-Free condition.
- Description
- In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Modified
- Products
- linux_kernel
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
Kernel-hack-drill и новый эксплойт для CVE-2024-50264 в ядре Linux https://t.co/lHdHrLv5co https://t.co/YoG5XmldjN
@VulnersHub
3 Oct 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Reduce the attack surface for CVE-2024-50264 without patching https://t.co/xFXXcDi3qV
@vicariusltd
16 Sept 2025
100 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Linuxカーネル脆弱性CVE-2024-50264に対し、新たな権限昇格手法が公開された。従来は不安定なレース条件と複雑なメモリスプレーを要したが、研究者Alexander Popovはmsg_msgオブジェクトを利用し、安定したUAF悪用を
@yousukezan
9 Sept 2025
1461 Impressions
2 Retweets
8 Likes
1 Bookmark
0 Replies
0 Quotes
Linuxカーネルの重大脆弱性CVE-2024-50264に対して、新たな攻撃手法が発見された。従来は困難とされたカーネルハードニングを突破し、権限昇格を現実的な脅威に変えた点で注目を集めている。 この脆弱性はLinu
@yousukezan
9 Sept 2025
3234 Impressions
7 Retweets
19 Likes
16 Bookmarks
0 Replies
0 Quotes
Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel #cybersecurity #linux https://t.co/sp0VgWbXyJ
@davilagrau
5 Sept 2025
200 Impressions
0 Retweets
2 Likes
1 Bookmark
0 Replies
0 Quotes
Kernel-hack-drill and exploiting CVE-2024-50264 in the Linux kernel: https://t.co/R5KoUy1l3V #infosec #cybersecurity #tech #AI #linux
@GothamJSharma
3 Sept 2025
145 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel https://t.co/Zb1OPynINg
@_r_netsec
3 Sept 2025
577 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
Fascinating deep dive into exploiting a Linux kernel UAF vulnerability (CVE-2024-50264) 🔍. Even Hacker News readers are struggling to pull away! A must-read for security enthusiasts. #HackerNews #Tech 🐧 https://t.co/LthumtmvJp
@thatkid02
3 Sept 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Kernel-hack-drill and exploiting CVE-2024-50264 in the Linux kernel #HackerNews https://t.co/pTTubrJsaM https://t.co/rPWbny9KZa
@hackernewstop5
3 Sept 2025
96 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️ I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025 https://t.co/0DJzCJ
@a13xp0p0v
2 Sept 2025
10136 Impressions
56 Retweets
165 Likes
83 Bookmarks
1 Reply
0 Quotes
New article by @a13xp0p0v: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel." Alexander used his pet project kernel-hack-drill to exploit a hard race condition that received the Pwnie Award 2025. https://t.co/qiZwf1UvRe https://t.co/1zWley1
@ptswarm
2 Sept 2025
2697 Impressions
16 Retweets
35 Likes
9 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2017-5689 2 - CVE-2025-31324 3 - CVE-2025-8088 4 - CVE-2025-4609 5 - CVE-2024-50264 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
10 Aug 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Our CVE-2024-50264 with @_qwerty_po has won the Best Privilege Escalation category at the 2025 Pwnie Awards. Thank you, @PwnieAwards!! https://t.co/zYEZFNT1Tv
@v4bel
9 Aug 2025
5474 Impressions
9 Retweets
102 Likes
14 Bookmarks
7 Replies
0 Quotes
🇰🇷 Our researcher @a13xp0p0v spoke at #Zer0Con2025 in Seoul, describing his experiments with CVE-2024-50264 in the Linux kernel involving his toolkit kernel-hack-drill. Huge respect 👏 Until next time! #LinuxSecurity https://t.co/Gebwo88bYy
@PTsecurity_EN
16 Apr 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Slides of my talk at #Zer0Con2025! ⚡️ Kernel-Hack-Drill: Environment For Developing Linux Kernel Exploits ⚡️ I presented the kernel-hack-drill open-source project and showed how it helped me to exploit CVE-2024-50264 in the Linux kernel. Enjoy! https://t.co/84DqT4rdvm https://
@a13xp0p0v
14 Apr 2025
9680 Impressions
70 Retweets
232 Likes
107 Bookmarks
3 Replies
2 Quotes
kernelCTF VSock 0-day write-up by @v4bel @_qwerty_po (exp196/exp197, CVE-2024-50264) https://t.co/ChTa7JC8PR
@alexjplaskett
20 Jan 2025
3205 Impressions
8 Retweets
87 Likes
31 Bookmarks
0 Replies
0 Quotes
kernelCTF VSock 0-day: CVE-2024-50264 by @v4bel and @_qwerty_po https://t.co/ChTa7JCGFp
@alexjplaskett
6 Jan 2025
4465 Impressions
22 Retweets
105 Likes
54 Bookmarks
3 Replies
0 Quotes
I just released our kernelCTF VSock 0-day write-up with @_qwerty_po . (exp196/exp197, CVE-2024-50264) https://t.co/8UpGrVcDFF We made history by being the first to exploit VSock in kernelCTF, expanding its known attack vectors. 🥳 It’s a pretty *simple* race condition, right? h
@v4bel
19 Dec 2024
12731 Impressions
46 Retweets
193 Likes
85 Bookmarks
6 Replies
3 Quotes
CVE-2024-50264 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback com… https://t.co/8odlWu3zoz
@CVEnew
19 Nov 2024
557 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0F611C46-499A-456F-BDCC-537FE0579161",
"versionEndExcluding": "4.19.324",
"versionStartIncluding": "4.8"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9952C897-8A61-4D4B-9D6D-7D063E9EA15E",
"versionEndExcluding": "5.4.286",
"versionStartIncluding": "4.20"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BF5B32D0-72C9-41C3-A0BB-D4946153C134",
"versionEndExcluding": "5.10.230",
"versionStartIncluding": "5.5"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "88812664-4296-42AC-AE0F-ED71086C1BB1",
"versionEndExcluding": "5.15.172",
"versionStartIncluding": "5.11"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0DD7F755-2F6B-4707-8973-78496AD5AA8E",
"versionEndExcluding": "6.1.117",
"versionStartIncluding": "5.16"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "630ED7EB-C97E-4435-B884-1E309E40D6F3",
"versionEndExcluding": "6.6.61",
"versionStartIncluding": "6.2"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0BD000F7-3DAD-4DD3-8906-98EA1EC67E95",
"versionEndExcluding": "6.11.8",
"versionStartIncluding": "6.7"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
}
],
"operator": "OR"
}
]
}
]