{"vulnerability": "CVE-2024-50073", "sightings": [{"uuid": "9637c06b-977f-4505-a56f-0da128ff6ac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50073", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lvnqg5kw5i2y", "content": "", "creation_timestamp": "2025-08-05T12:45:10.756943Z"}, {"uuid": "93ef116c-78ad-492a-bfc1-900b6d3822a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50073", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lvnqgdnhqa2y", "content": "", "creation_timestamp": "2025-08-05T12:45:17.238176Z"}, {"uuid": "695fa635-0ac3-4860-9b4d-bbdca59e76a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50073", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3lvnqgeuwxlk2", "content": "", "creation_timestamp": "2025-08-05T12:47:48.420060Z"}, {"uuid": "069ce359-1206-4b3b-9b7b-1d56f40f81b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50073", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lvog3d3v222f", "content": "", "creation_timestamp": "2025-08-05T19:12:53.443164Z"}, {"uuid": "3039e6d6-26a3-4b6f-baab-0f583b4bd09b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50073", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lvp6esrk2i2e", "content": "", "creation_timestamp": "2025-08-06T02:27:38.465203Z"}, {"uuid": "f767388d-70b1-4633-885d-ba21ade264af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-50073", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "4cd063d8-7bd1-4134-8d6d-9faef914c0ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50073", "type": "seen", "source": "https://t.me/cvedetector/9231", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50073 - VMware Linux Kernel TTY Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50073 \nPublished : Oct. 29, 2024, 1:15 a.m. | 38\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ntty: n_gsm: Fix use-after-free in gsm_cleanup_mux  \n  \nBUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0  \ndrivers/tty/n_gsm.c:3160 [n_gsm]  \nRead of size 8 at addr ffff88815fe99c00 by task poc/3379  \nCPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56  \nHardware name: VMware, Inc. VMware Virtual Platform/440BX  \nDesktop Reference Platform, BIOS 6.00 11/12/2020  \nCall Trace:  \n   \n gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  \n __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]  \n __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389  \n update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500  \n __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846  \n __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161  \n gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  \n _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107  \n __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]  \n ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195  \n ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79  \n __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338  \n __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805  \n tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  \n  \nAllocated by task 65:  \n gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]  \n gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]  \n gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]  \n gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]  \n tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391  \n tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39  \n flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445  \n process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229  \n worker_thread+0x3dc/0x950 kernel/workqueue.c:3391  \n kthread+0x2a3/0x370 kernel/kthread.c:389  \n ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147  \n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257  \n  \nFreed by task 3367:  \n kfree+0x126/0x420 mm/slub.c:4580  \n gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]  \n gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]  \n tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818  \n  \n[Analysis]  \ngsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux  \ncan be freed by multi threads through ioctl,which leads  \nto the occurrence of uaf. Protect it by gsm tx lock. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T03:03:07.000000Z"}]}