Vulnerabilities > Operation on a Resource after Expiration or Release

DATE CVE VULNERABILITY TITLE RISK
2024-12-27 CVE-2024-56674 Operation on a Resource after Expiration or Release vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: virtio_net: correct netdev_tx_reset_queue() invocation point When virtnet_close is followed by virtnet_open, some TX completions can possibly remain unconsumed, until they are finally processed during the first NAPI poll after the netdev_tx_reset_queue(), resulting in a crash [1].
local
low complexity
linux CWE-672
5.5
2024-10-21 CVE-2024-49953 Operation on a Resource after Expiration or Release vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice The km.state is not checked in driver's delayed work.
local
low complexity
linux CWE-672
5.5
2024-10-21 CVE-2024-49955 Operation on a Resource after Expiration or Release vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: ACPI: battery: Fix possible crash when unregistering a battery hook When a battery hook returns an error when adding a new battery, then the battery hook is automatically unregistered. However the battery hook provider cannot know that, so it will later call battery_hook_unregister() on the already unregistered battery hook, resulting in a crash. Fix this by using the list head to mark already unregistered battery hooks as already being unregistered so that they can be ignored by battery_hook_unregister().
local
low complexity
linux CWE-672
5.5
2024-08-14 CVE-2024-39792 Operation on a Resource after Expiration or Release vulnerability in F5 Nginx Plus R30/R31/R32
When the NGINX Plus is configured to use the MQTT pre-read module, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
network
low complexity
f5 CWE-672
7.5
2024-05-22 CVE-2024-31894 Operation on a Resource after Expiration or Release vulnerability in IBM APP Connect Enterprise
IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token.
network
low complexity
ibm CWE-672
4.3
2024-05-22 CVE-2024-31895 Operation on a Resource after Expiration or Release vulnerability in IBM APP Connect Enterprise
IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token.
network
low complexity
ibm CWE-672
6.5
2024-05-22 CVE-2024-31893 Operation on a Resource after Expiration or Release vulnerability in IBM APP Connect Enterprise
IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive calendar information using an expired access token.
network
low complexity
ibm CWE-672
4.3
2024-03-01 CVE-2021-47069 Operation on a Resource after Expiration or Release vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry do_mq_timedreceive calls wq_sleep with a stack local address.
local
high complexity
linux CWE-672
7.0
2024-02-20 CVE-2023-48220 Operation on a Resource after Expiration or Release vulnerability in multiple products
Decidim is a participatory democracy framework.
network
high complexity
decidim scambra CWE-672
7.4
2024-02-14 CVE-2024-25619 Operation on a Resource after Expiration or Release vulnerability in Joinmastodon Mastodon
Mastodon is a free, open-source social network server based on ActivityPub.
network
low complexity
joinmastodon CWE-672
4.3