CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free. |
A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed. |
A heap use-after-free flaw was found in coders/bmp.c in ImageMagick. |
A race condition occurred between the functions lmLogClose and txEnd in JFS, in the Linux Kernel, executed in different threads. This flaw allows a local attacker with normal user privileges to crash the system or leak internal kernel information. |
In the Linux kernel, the following vulnerability has been resolved:
tls: separate no-async decryption request handling from async
If we're not doing async, the handling is much simpler. There's no
reference counting, we just need to wait for the completion to wake us
up and return its result.
We should preferably also use a separate crypto_wait. I'm not seeing a
UAF as I did in the past, I think aec7961916f3 ("tls: fix race between
async notify and socket close") took care of it.
This will make the next fix easier. |
A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. |
A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later. |
Use after free in Blink in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
Use after free in Desktop Windows Manager allows an authorized attacker to execute code locally. |
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally. |