Vulnerabilities > Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-01-08 | CVE-2024-54120 | Race Condition vulnerability in Huawei Harmonyos 5.0.0 Race condition vulnerability in the distributed notification module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. | 5.9 |
2025-01-08 | CVE-2024-56441 | Race Condition vulnerability in Huawei Emui and Harmonyos Race condition vulnerability in the Bastet module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 5.9 |
2024-12-25 | CVE-2024-52906 | IBM AIX 7.2, 7.3, VIOS 3.1, and 4.1 could allow a non-privileged local user to exploit a vulnerability in the TCP/IP kernel extension to cause a denial of service. | 5.5 |
2024-12-12 | CVE-2024-54122 | Race Condition vulnerability in Huawei Harmonyos 5.0.0 Concurrent variable access vulnerability in the ability module Impact: Successful exploitation of this vulnerability may affect availability. | 4.7 |
2024-12-12 | CVE-2024-54102 | Race Condition vulnerability in Huawei Harmonyos 4.2.0/5.0.0 Race condition vulnerability in the DDR module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 5.9 |
2024-12-12 | CVE-2024-54494 | Race Condition vulnerability in Apple products A race condition was addressed with additional validation. | 5.9 |
2024-12-12 | CVE-2024-54510 | Race Condition vulnerability in Apple products A race condition was addressed with improved locking. | 5.1 |
2024-12-12 | CVE-2024-49059 | Race Condition vulnerability in Microsoft products Microsoft Office Elevation of Privilege Vulnerability | 7.0 |
2024-12-04 | CVE-2024-53136 | Race Condition vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: mm: revert "mm: shmem: fix data-race in shmem_getattr()" Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as suggested by Chuck [1]. | 4.7 |
2024-12-02 | CVE-2024-53121 | Race Condition vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fs, lock FTE when checking if active The referenced commits introduced a two-step process for deleting FTEs: - Lock the FTE, delete it from hardware, set the hardware deletion function to NULL and unlock the FTE. - Lock the parent flow group, delete the software copy of the FTE, and remove it from the xarray. However, this approach encounters a race condition if a rule with the same match value is added simultaneously. | 5.5 |