Vulnerabilities > Double Free

DATE CVE VULNERABILITY TITLE RISK
2025-02-05 CVE-2024-39564 This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute.
network
low complexity
CWE-415
7.5
2025-01-31 CVE-2025-21673 Double Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix double free of TCP_Server_Info::hostname When shutting down the server in cifs_put_tcp_session(), cifsd thread might be reconnecting to multiple DFS targets before it realizes it should exit the loop, so @server->hostname can't be freed as long as cifsd thread isn't done.
local
low complexity
linux CWE-415
5.5
2025-01-06 CVE-2024-56766 Double Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: fix double free in atmel_pmecc_create_user() The "user" pointer was converted from being allocated with kzalloc() to being allocated by devm_kzalloc().
local
low complexity
linux CWE-415
7.8
2024-12-28 CVE-2024-56704 Double Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: 9p/xen: fix release of IRQ Kernel logs indicate an IRQ was double-freed. Pass correct device ID during IRQ release. [Dominique: remove confusing variable reset to 0]
local
low complexity
linux CWE-415
7.8
2024-12-28 CVE-2024-56708 Double Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: EDAC/igen6: Avoid segmentation fault on module unload The segmentation fault happens because: During modprobe: 1.
local
low complexity
linux CWE-415
7.8
2024-12-27 CVE-2024-53191 Double Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix warning when unbinding If there is an error during some initialization related to firmware, the buffers dp->tx_ring[i].tx_status are released. However this is released again when the device is unbinded (ath12k_pci), and we get: WARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80 Call Trace: free_large_kmalloc ath12k_dp_free ath12k_core_deinit ath12k_pci_remove ... The issue is always reproducible from a VM because the MSI addressing initialization is failing. In order to fix the issue, just set the buffers to NULL after releasing in order to avoid the double free.
local
low complexity
linux CWE-415
7.8
2024-12-27 CVE-2024-53213 Double Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Fix double free issue with interrupt buffer allocation In lan78xx_probe(), the buffer `buf` was being freed twice: once implicitly through `usb_free_urb(dev->urb_intr)` with the `URB_FREE_BUFFER` flag and again explicitly by `kfree(buf)`.
local
low complexity
linux CWE-415
7.8
2024-12-04 CVE-2024-53133 Double Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Handle dml allocation failure to avoid crash [Why] In the case where a dml allocation fails for any reason, the current state's dml contexts would no longer be valid.
local
low complexity
linux CWE-415
7.8
2024-11-19 CVE-2024-50276 Double Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net: vertexcom: mse102x: Fix possible double free of TX skb The scope of the TX skb is wider than just mse102x_tx_frame_spi(), so in case the TX skb room needs to be expanded, we should free the the temporary skb instead of the original skb.
local
low complexity
linux CWE-415
7.8
2024-11-12 CVE-2024-47426 Double Free vulnerability in Adobe Substance 3D Painter
Substance3D - Painter versions 10.1.0 and earlier are affected by a Double Free vulnerability that could result in arbitrary code execution in the context of the current user.
local
low complexity
adobe CWE-415
7.8