Vulnerabilities > Operation on a Resource after Expiration or Release
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-12-27 | CVE-2024-56674 | Operation on a Resource after Expiration or Release vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: virtio_net: correct netdev_tx_reset_queue() invocation point When virtnet_close is followed by virtnet_open, some TX completions can possibly remain unconsumed, until they are finally processed during the first NAPI poll after the netdev_tx_reset_queue(), resulting in a crash [1]. | 5.5 |
2024-10-21 | CVE-2024-49953 | Operation on a Resource after Expiration or Release vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice The km.state is not checked in driver's delayed work. | 5.5 |
2024-10-21 | CVE-2024-49955 | Operation on a Resource after Expiration or Release vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ACPI: battery: Fix possible crash when unregistering a battery hook When a battery hook returns an error when adding a new battery, then the battery hook is automatically unregistered. However the battery hook provider cannot know that, so it will later call battery_hook_unregister() on the already unregistered battery hook, resulting in a crash. Fix this by using the list head to mark already unregistered battery hooks as already being unregistered so that they can be ignored by battery_hook_unregister(). | 5.5 |
2024-08-14 | CVE-2024-39792 | Operation on a Resource after Expiration or Release vulnerability in F5 Nginx Plus R30/R31/R32 When the NGINX Plus is configured to use the MQTT pre-read module, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | 7.5 |
2024-05-22 | CVE-2024-31894 | Operation on a Resource after Expiration or Release vulnerability in IBM APP Connect Enterprise IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token. | 4.3 |
2024-05-22 | CVE-2024-31895 | Operation on a Resource after Expiration or Release vulnerability in IBM APP Connect Enterprise IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token. | 6.5 |
2024-05-22 | CVE-2024-31893 | Operation on a Resource after Expiration or Release vulnerability in IBM APP Connect Enterprise IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive calendar information using an expired access token. | 4.3 |
2024-03-01 | CVE-2021-47069 | Operation on a Resource after Expiration or Release vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry do_mq_timedreceive calls wq_sleep with a stack local address. | 7.0 |
2024-02-20 | CVE-2023-48220 | Operation on a Resource after Expiration or Release vulnerability in multiple products Decidim is a participatory democracy framework. | 7.4 |
2024-02-14 | CVE-2024-25619 | Operation on a Resource after Expiration or Release vulnerability in Joinmastodon Mastodon Mastodon is a free, open-source social network server based on ActivityPub. | 4.3 |