Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2024-05-30 CVE-2024-5498 Use After Free vulnerability in multiple products
Use after free in Presentation API in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2024-05-30 CVE-2024-36899 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem.
local
high complexity
linux CWE-416
7.0
2024-05-30 CVE-2024-36932 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: thermal/debugfs: Prevent use-after-free from occurring after cdev removal Since thermal_debug_cdev_remove() does not run under cdev->lock, it can run in parallel with thermal_debug_cdev_state_update() and it may free the struct thermal_debugfs object used by the latter after it has been checked against NULL. If that happens, thermal_debug_cdev_state_update() will access memory that has been freed already causing the kernel to crash. Address this by using cdev->lock in thermal_debug_cdev_remove() around the cdev->debugfs value check (in case the same cdev is removed at the same time in two different threads) and its reset to NULL. Cc :6.8+ <[email protected]> # 6.8+
local
low complexity
linux CWE-416
5.5
2024-05-29 CVE-2024-34161 Use After Free vulnerability in multiple products
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory.
network
low complexity
f5 fedoraproject CWE-416
5.3
2024-05-24 CVE-2021-47500 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: iio: mma8452: Fix trigger reference couting The mma8452 driver directly assigns a trigger to the struct iio_dev.
local
low complexity
linux CWE-416
7.8
2024-05-24 CVE-2021-47505 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: aio: fix use-after-free due to missing POLLFREE handling signalfd_poll() and binder_poll() are special in that they use a waitqueue whose lifetime is the current task, rather than the struct file as is normally the case.
local
low complexity
linux CWE-416
7.8
2024-05-24 CVE-2021-47506 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix use-after-free due to delegation race A delegation break could arrive as soon as we've called vfs_setlease.
local
low complexity
linux CWE-416
7.8
2024-05-24 CVE-2021-47520 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: can: pch_can: pch_can_rx_normal: fix use after free After calling netif_receive_skb(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is dereferenced just after the call netif_receive_skb(skb). Reordering the lines solves the issue.
local
low complexity
linux CWE-416
7.8
2024-05-24 CVE-2021-47521 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: can: sja1000: fix use after free in ems_pcmcia_add_card() If the last channel is not available then "dev" is freed.
local
low complexity
linux CWE-416
7.8
2024-05-24 CVE-2021-47525 Use After Free vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: serial: liteuart: fix use-after-free and memleak on unbind Deregister the port when unbinding the driver to prevent it from being used after releasing the driver data and leaking memory allocated by serial core.
local
low complexity
linux CWE-416
7.8