In the Linux kernel, the following vulnerability has been resolved:
sh: intc: Fix use-after-free bug in register_intc_controller()
In the error handling for this function, d is freed without ever
removing it from intc_list which would lead to a use after free.
To fix this, let's only add it to the list after everything has
succeeded.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-12-27 14:15
Updated : 2025-11-03 21:17
NVD link : CVE-2024-53165
Mitre link : CVE-2024-53165
CVE.ORG link : CVE-2024-53165
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
