Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-416 (释放后使用) — Vulnerability Class 2435

2435 vulnerabilities classified as CWE-416 (释放后使用). AI Chinese analysis included.

CWE-416, Use After Free, is a critical memory safety weakness occurring when a program continues to reference a memory location after it has been deallocated. Attackers typically exploit this vulnerability by freeing an object and then rapidly reallocating that same memory block with attacker-controlled data. Because the original pointer still points to the now-invalid address, the application may inadvertently execute malicious code or corrupt memory structures, often leading to arbitrary code execution or denial of service. To prevent this, developers must rigorously manage memory lifecycles by nullifying pointers immediately after freeing them, ensuring no dangling references remain. Utilizing modern programming languages with automatic garbage collection or employing static analysis tools to detect invalid memory accesses further mitigates the risk, ensuring that freed memory is never accessed again during the program’s execution.

MITRE CWE Description
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Common Consequences (4)
IntegrityModify Memory
The use of previously freed memory may corrupt valid data, if the memory area in question has been allocated and used properly elsewhere.
AvailabilityDoS: Crash, Exit, or Restart
If chunk consolidation occurs after the use of previously freed data, the process may crash when invalid data is used as chunk information.
ConfidentialityRead Memory
Read operations on freed memory can sometimes leak sensitive information instead of causing a crash
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
If malicious data is entered before chunk consolidation can take place, it may be possible to take advantage of a write-what-where primitive to execute arbitrary code. If the newly allocated data happens to hold a class, in C++ for example, various function pointers may be scattered within the heap …
Mitigations (2)
Architecture and DesignChoose a language that provides automatic memory management.
ImplementationWhen freeing pointers, be sure to set them to NULL once they are freed. However, the utilization of multiple or complex data structures may lower the usefulness of this strategy.
Effectiveness: Defense in Depth
Examples (2)
The following example demonstrates the weakness.
#include <stdio.h> #include <unistd.h> #define BUFSIZER1 512 #define BUFSIZER2 ((BUFSIZER1/2) - 8) int main(int argc, char **argv) { char *buf1R1; char *buf2R1; char *buf2R2; char *buf3R2; buf1R1 = (char *) malloc(BUFSIZER1); buf2R1 = (char *) malloc(BUFSIZER1); free(buf2R1); buf2R2 = (char *) malloc(BUFSIZER2); buf3R2 = (char *) malloc(BUFSIZER2); strncpy(buf2R1, argv[1], BUFSIZER1-1); free(buf1R1); free(buf2R2); free(buf3R2); }
Bad · C
The following code illustrates a use after free error:
char* ptr = (char*)malloc (SIZE); if (err) { abrt = 1; free(ptr); } ... if (abrt) { logError("operation aborted before commit", ptr); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2026-24681 FreeRDP has a heap-use-after-free in urb_bulk_transfer_cb — FreeRDP 8.8AIHighAI2026-02-09
CVE-2026-24680 FreeRDP has a heap-use-after-free in update_pointer_new(SDL) — FreeRDP 9.1AICriticalAI2026-02-09
CVE-2026-24678 FreeRDP has a Heap-use-after-free in cam_v4l_stream_capture_thread — FreeRDP 8.8 -2026-02-09
CVE-2026-24677 FreeRDP has a heap-buffer-overflow in ecam_encoder_compress_h264 — FreeRDP 9.1AICriticalAI2026-02-09
CVE-2026-24676 FreeRDP has a heap-use-after-free in audio_format_compatible — FreeRDP 9.8AICriticalAI2026-02-09
CVE-2026-24675 FreeRDP has a Heap-use-after-free in urb_select_interface — FreeRDP 9.8AICriticalAI2026-02-09
CVE-2026-24491 FreeRDP has a heap-use-after-free in video_timer — FreeRDP 8.3AIHighAI2026-02-09
CVE-2026-24927 Huawei EMUI和Huawei HarmonyOS 安全漏洞 — HarmonyOS 5.5 Medium2026-02-06
CVE-2026-24917 Huawei EMUI和Huawei HarmonyOS 安全漏洞 — HarmonyOS 6.5 Medium2026-02-06
CVE-2026-24914 Huawei HarmonyOS 安全漏洞 — HarmonyOS 4.0 Medium2026-02-06
CVE-2026-1979 mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec use after free — mruby 5.3 Medium2026-02-06
CVE-2026-25507 ESF-IDF Has Use-after-free Vulnerability in BLE Provisioning — esp-idf 6.3 Medium2026-02-04
CVE-2025-47398 Use After Free in Graphics — Snapdragon 7.8 High2026-02-02
CVE-2025-47359 Use After Free in Secure Processor — Snapdragon 7.8 High2026-02-02
CVE-2025-47358 Use After Free in Secure Processor — Snapdragon 7.8 High2026-02-02
CVE-2026-20414 MediaTek Chipsets 安全漏洞 — MediaTek chipset 6.7AIMediumAI2026-02-02
CVE-2026-20411 MediaTek Chipsets 安全漏洞 — MediaTek chipset 4.4AIMediumAI2026-02-02
CVE-2025-33220 NVIDIA vGPU 资源管理错误漏洞 — GeForce 7.8 High2026-01-28
CVE-2025-33217 NVIDIA Display Driver 资源管理错误漏洞 — GeForce 7.8 High2026-01-28
CVE-2026-22264 Suricata detect/alert: heap-use-after-free on alert queue expansion — suricata 7.4 High2026-01-27
CVE-2025-13952 GPU DDK - libusc UAF via WebGPU shaders at MergeConsecutiveBarriersBP — Graphics DDK 9.8 -2026-01-24
CVE-2025-15062 Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerability — SketchUp 7.8 -2026-01-23
CVE-2026-0794 ALGO 8180 IP Audio Alerter SIP Use-After-Free Remote Code Execution Vulnerability — 8180 IP Audio Alerter 9.8 -2026-01-23
CVE-2026-0908 Google Chrome 安全漏洞 — Chrome 8.8 -2026-01-20
CVE-2026-23884 Heap-use-after-free in gdi_set_bounds — FreeRDP 9.8 -2026-01-19
CVE-2026-23883 Heap-use-after-free in update_pointer_new — FreeRDP 9.8 -2026-01-19
CVE-2026-1144 quickjs-ng quickjs Atomics Ops quickjs.c use after free — quickjs 6.3 Medium2026-01-19
CVE-2025-15538 Open Asset Import Library Assimp LWOMaterial.cpp FindUVChannels use after free — Assimp 5.3 Medium2026-01-18
CVE-2026-21921 Junos OS and Junos OS Evolved: When telemetry collectors are frequently subscribing and unsubscribing to sensors chassisd or rpd will crash — Junos OS 6.5 Medium2026-01-15
CVE-2026-21908 Junos OS and Junos OS Evolved: Use after free vulnerability In 802.1X authentication daemon can cause crash of the dot1xd process — Junos OS 7.1 High2026-01-15

Vulnerabilities classified as CWE-416 (释放后使用) represent 2435 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.