Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-02-27 | CVE-2025-21718 | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net: rose: fix timer races against user threads Rose timers only acquire the socket spinlock, without checking if the socket is owned by one user thread. Add a check and rearm the timers if needed. BUG: KASAN: slab-use-after-free in rose_timer_expiry+0x31d/0x360 net/rose/rose_timer.c:174 Read of size 2 at addr ffff88802f09b82a by task swapper/0/0 CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.13.0-rc5-syzkaller-00172-gd1bf27c4e176 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <IRQ> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 rose_timer_expiry+0x31d/0x360 net/rose/rose_timer.c:174 call_timer_fn+0x187/0x650 kernel/time/timer.c:1793 expire_timers kernel/time/timer.c:1844 [inline] __run_timers kernel/time/timer.c:2418 [inline] __run_timer_base+0x66a/0x8e0 kernel/time/timer.c:2430 run_timer_base kernel/time/timer.c:2439 [inline] run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2449 handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049 </IRQ> | 7.0 |
2025-02-18 | CVE-2025-0622 | A flaw was found in command/gpg. | 6.4 |
2025-02-12 | CVE-2024-57951 | Use After Free vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: hrtimers: Handle CPU state correctly on hotplug Consider a scenario where a CPU transitions from CPUHP_ONLINE to halfway through a CPU hotunplug down to CPUHP_HRTIMERS_PREPARE, and then back to CPUHP_ONLINE: Since hrtimers_prepare_cpu() does not run, cpu_base.hres_active remains set to 1 throughout. | 7.8 |
2025-02-11 | CVE-2024-12548 | Use After Free vulnerability in Tungstenautomation Power PDF Tungsten Automation Power PDF JP2 File Parsing Use-After-Free Information Disclosure Vulnerability. | 3.3 |
2025-02-11 | CVE-2025-0899 | Use After Free vulnerability in Pdf-Xchange Editor PDF-XChange Editor AcroForm Use-After-Free Remote Code Execution Vulnerability. | 8.8 |
2025-02-11 | CVE-2025-21159 | Use After Free vulnerability in Adobe Illustrator 29.0/29.0.1/29.1 Illustrator versions 29.1, 28.7.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. | 7.8 |
2025-02-11 | CVE-2025-21367 | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability | 7.8 |
2025-02-07 | CVE-2025-0304 | Use After Free vulnerability in Openatom Openharmony 4.1.0/4.1.1 in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. | 7.8 |
2025-02-06 | CVE-2024-57959 | Use After Free vulnerability in Huawei Emui and Harmonyos Use-After-Free (UAF) vulnerability in the display module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. | 9.8 |
2025-02-04 | CVE-2025-1009 | Use After Free vulnerability in Mozilla Firefox An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. | 9.8 |