In the Linux kernel, the following vulnerability has been resolved:
sh: intc: Fix use-after-free bug in register_intc_controller()
In the error handling for this function, d is freed without ever
removing it from intc_list which would lead to a use after free.
To fix this, let's only add it to the list after everything has
succeeded.
References
Configurations
Configuration 1 (hide)
|
History
14 Jan 2025, 16:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-416 | |
References | () https://git.kernel.org/stable/c/3c7c806b3eafd94ae0f77305a174d63b69ec187c - Patch | |
References | () https://git.kernel.org/stable/c/588bdec1ff8b81517dbae0ae51c9df52c0b952d3 - Patch | |
References | () https://git.kernel.org/stable/c/63e72e551942642c48456a4134975136cdcb9b3c - Patch | |
References | () https://git.kernel.org/stable/c/6ba6e19912570b2ad68298be0be1dc779014a303 - Patch | |
References | () https://git.kernel.org/stable/c/971b4893457788e0e123ea552f0bb126a5300e61 - Patch | |
References | () https://git.kernel.org/stable/c/b8b84dcdf3ab1d414304819f824b10efba64132c - Patch | |
References | () https://git.kernel.org/stable/c/c3f4f4547fb291982f5ef56c048277c4d5ccc4e4 - Patch | |
References | () https://git.kernel.org/stable/c/c43df7dae28fb9fce96ef088250c1e3c3a77c527 - Patch | |
References | () https://git.kernel.org/stable/c/d8de818df12d86a1a26a8efd7b4b3b9c6dc3c5cc - Patch | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
27 Dec 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-27 14:15
Updated : 2025-02-11 16:15
NVD link : CVE-2024-53165
Mitre link : CVE-2024-53165
CVE.ORG link : CVE-2024-53165
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free