In the Linux kernel, the following vulnerability has been resolved:
sh: intc: Fix use-after-free bug in register_intc_controller()
In the error handling for this function, d is freed without ever
removing it from intc_list which would lead to a use after free.
To fix this, let's only add it to the list after everything has
succeeded.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Jan 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | CWE-416 | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
|
Metrics |
cvssV3_1
|
Thu, 09 Jan 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Dec 2024 14:00:00 +0000
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-12-27T13:49:11.401Z
Updated: 2024-12-27T13:49:11.401Z
Reserved: 2024-11-19T17:17:25.004Z
Link: CVE-2024-53165
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2024-12-27T14:15:23.583
Modified: 2025-01-14T16:12:47.017
Link: CVE-2024-53165
Redhat