We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A race condition Use-After-Free vulnerability exists in the virtio_transport_space_update function within the Kernel 5.4 on ChromeOS. Concurrent allocation and freeing of the virtio_vsock_sock structure during an AF_VSOCK connect syscall can occur before a worker thread accesses it resulting in a dangling pointer and potential kernel code execution.
Reserved 2025-02-13 | Published 2025-04-17 | Updated 2025-05-08 | Assigner ChromeOSUse-After-Free (UAF)
issuetracker.google.com/issues/301886931
issues.chromium.org/issues/b/301886931
Support options