CVE-2024-53165

In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Jan 2025, 16:12

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-416
References () https://git.kernel.org/stable/c/3c7c806b3eafd94ae0f77305a174d63b69ec187c - () https://git.kernel.org/stable/c/3c7c806b3eafd94ae0f77305a174d63b69ec187c - Patch
References () https://git.kernel.org/stable/c/588bdec1ff8b81517dbae0ae51c9df52c0b952d3 - () https://git.kernel.org/stable/c/588bdec1ff8b81517dbae0ae51c9df52c0b952d3 - Patch
References () https://git.kernel.org/stable/c/63e72e551942642c48456a4134975136cdcb9b3c - () https://git.kernel.org/stable/c/63e72e551942642c48456a4134975136cdcb9b3c - Patch
References () https://git.kernel.org/stable/c/6ba6e19912570b2ad68298be0be1dc779014a303 - () https://git.kernel.org/stable/c/6ba6e19912570b2ad68298be0be1dc779014a303 - Patch
References () https://git.kernel.org/stable/c/971b4893457788e0e123ea552f0bb126a5300e61 - () https://git.kernel.org/stable/c/971b4893457788e0e123ea552f0bb126a5300e61 - Patch
References () https://git.kernel.org/stable/c/b8b84dcdf3ab1d414304819f824b10efba64132c - () https://git.kernel.org/stable/c/b8b84dcdf3ab1d414304819f824b10efba64132c - Patch
References () https://git.kernel.org/stable/c/c3f4f4547fb291982f5ef56c048277c4d5ccc4e4 - () https://git.kernel.org/stable/c/c3f4f4547fb291982f5ef56c048277c4d5ccc4e4 - Patch
References () https://git.kernel.org/stable/c/c43df7dae28fb9fce96ef088250c1e3c3a77c527 - () https://git.kernel.org/stable/c/c43df7dae28fb9fce96ef088250c1e3c3a77c527 - Patch
References () https://git.kernel.org/stable/c/d8de818df12d86a1a26a8efd7b4b3b9c6dc3c5cc - () https://git.kernel.org/stable/c/d8de818df12d86a1a26a8efd7b4b3b9c6dc3c5cc - Patch
Summary
  • (es) En el núcleo de Linux, se ha resuelto la siguiente vulnerabilidad: sh: intc: Fix use-after-free bug in register_intc_controller() en la gestión de errores para esta función, d se libera sin quitarlo nunca de intc_list, lo que provocaría un use-after-free. Para solucionar esto, solo agreguémoslo a la lista después de que todo haya sido exitoso.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

27 Dec 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 14:15

Updated : 2025-02-11 16:15


NVD link : CVE-2024-53165

Mitre link : CVE-2024-53165

CVE.ORG link : CVE-2024-53165


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free