| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jjp3-mq3x-295m | Electron: Use-after-free in PowerMonitor on Windows and macOS |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Electron
Electron electron |
|
| Vendors & Products |
Electron
Electron electron |
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, apps that use the powerMonitor module may be vulnerable to a use-after-free. After the native PowerMonitor object is garbage-collected, the associated OS-level resources (a message window on Windows, a shutdown handler on macOS) retain dangling references. A subsequent session-change event (Windows) or system shutdown (macOS) dereferences freed memory, which may lead to a crash or memory corruption. All apps that access powerMonitor events (suspend, resume, lock-screen, etc.) are potentially affected. The issue is not directly renderer-controllable. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8. | |
| Title | Electron: Use-after-free in PowerMonitor on Windows and macOS | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T03:55:36.380Z
Reserved: 2026-03-30T19:54:55.555Z
Link: CVE-2026-34770
Updated: 2026-04-06T19:10:11.362Z
Status : Undergoing Analysis
Published: 2026-04-04T00:16:17.823
Modified: 2026-04-07T13:20:55.200
Link: CVE-2026-34770
No data.
OpenCVE Enrichment
Updated: 2026-04-06T22:21:18Z
Github GHSA