{"id":"ASB-A-378870958","details":"In virtio_transport_destruct of virtio_transport_common.c, there is possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.","aliases":["A-378870958","CVE-2024-50264"],"modified":"2026-03-11T06:30:37.489793Z","published":"2025-04-01T00:00:00Z","references":[{"type":"ADVISORY","url":"https://source.android.com/security/bulletin/2025-04-01"},{"type":"FIX","url":"https://android.googlesource.com/kernel/common/+/23dafd0055ada5f95360c0724f84f6e999d5407b"}],"affected":[{"package":{"name":":linux_kernel:","ecosystem":"Android"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":":0"},{"fixed":":2025-04-05"}]}],"versions":["Kernel"],"ecosystem_specific":{"fixes":["https://android.googlesource.com/kernel/common/+/23dafd0055ada5f95360c0724f84f6e999d5407b"],"vanir_signatures":[{"id":"ASB-A-378870958-97da122b","deprecated":false,"signature_version":"v1","source":"https://android.googlesource.com/kernel/common/+/23dafd0055ada5f95360c0724f84f6e999d5407b","digest":{"threshold":0.9,"line_hashes":["93977310876986077576665763442512925816","163800357948092888600624900561682532725","136815264389493747422028697590892460623","163716186038971930399625291126554016251"]},"signature_type":"Line","target":{"file":"net/vmw_vsock/virtio_transport_common.c"}},{"id":"ASB-A-378870958-f5395513","deprecated":false,"signature_version":"v1","source":"https://android.googlesource.com/kernel/common/+/23dafd0055ada5f95360c0724f84f6e999d5407b","digest":{"function_hash":"29489074915205943468631857696750719064","length":86},"signature_type":"Function","target":{"function":"virtio_transport_destruct","file":"net/vmw_vsock/virtio_transport_common.c"}}],"types":["EoP"],"severity":"High","spl":"2025-04-05"},"database_specific":{"source":"https://storage.googleapis.com/android-osv-test/ASB-A-378870958.json"}}],"schema_version":"1.7.5"}