In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024111920-CVE-2024-50264-0889@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:10944 https://access.redhat.com/errata/RHSA-2024:10944
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:10943 https://access.redhat.com/errata/RHSA-2024:10943
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:2627 https://access.redhat.com/errata/RHSA-2025:2627
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:3510 https://access.redhat.com/errata/RHSA-2025:3510