CWE-832: Unlock of a Resource that is not Locked
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The product attempts to unlock a resource that is not locked.
扩展描述
Depending on the locking functionality, an unlock of a non-locked resource might cause memory corruption or other modification to the resource (or its associated metadata that is used for tracking locks).
常见后果
影响范围: Integrity Confidentiality Availability Other
技术影响: DoS: Crash, Exit, or Restart Execute Unauthorized Code or Commands Modify Memory Other
说明: Depending on the locking being used, an unlock operation might not have any adverse effects. When effects exist, the most common consequence will be a corruption of the state of the product, possibly leading to a crash or exit; depending on the implementation of the unlocking, memory corruption or code execution could occur.
观察示例
参考: CVE-2010-4210
function in OS kernel unlocks a mutex that was not previously locked, causing a panic or overwrite of arbitrary memory.
参考: CVE-2008-4302
Chain: OS kernel does not properly handle a failure of a function call (CWE-755), leading to an unlock of a resource that was not locked (CWE-832), with resultant crash.
参考: CVE-2009-1243
OS kernel performs an unlock in some incorrect circumstances, leading to panic.