A race condition Use-After-Free vulnerability exists in the virtio_transport_space_update function within the Kernel 5.4 on ChromeOS. Concurrent allocation and freeing of the virtio_vsock_sock structure during an AF_VSOCK connect syscall can occur before a worker thread accesses it resulting in a dangling pointer and potential kernel code execution.
History

Thu, 17 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 01:00:00 +0000

Type Values Removed Values Added
Description A race condition Use-After-Free vulnerability exists in the virtio_transport_space_update function within the Kernel 5.4 on ChromeOS. Concurrent allocation and freeing of the virtio_vsock_sock structure during an AF_VSOCK connect syscall can occur before a worker thread accesses it, resulting in a dangling pointer and potential kernel code execution. A race condition Use-After-Free vulnerability exists in the virtio_transport_space_update function within the Kernel 5.4 on ChromeOS. Concurrent allocation and freeing of the virtio_vsock_sock structure during an AF_VSOCK connect syscall can occur before a worker thread accesses it resulting in a dangling pointer and potential kernel code execution.

Thu, 17 Apr 2025 00:30:00 +0000

Type Values Removed Values Added
Description A race condition Use-After-Free vulnerability exists in the virtio_transport_space_update function within the Kernel 5.4 on ChromeOS. Concurrent allocation and freeing of the virtio_vsock_sock structure during an AF_VSOCK connect syscall can occur before a worker thread accesses it, resulting in a dangling pointer and potential kernel code execution.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: ChromeOS

Published:

Updated: 2025-04-17T13:26:51.654Z

Reserved: 2025-02-13T22:19:47.467Z

Link: CVE-2025-1290

cve-icon Vulnrichment

Updated: 2025-04-17T13:26:29.180Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-17T01:15:46.317

Modified: 2025-04-17T20:21:48.243

Link: CVE-2025-1290

cve-icon Redhat

No data.