In the Linux kernel, the following vulnerability has been resolved:
sh: intc: Fix use-after-free bug in register_intc_controller()
In the error handling for this function, d is freed without ever
removing it from intc_list which would lead to a use after free.
To fix this, let's only add it to the list after everything has
succeeded.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
threat_severity
|
threat_severity
|
Tue, 11 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | CWE-416 | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
|
Metrics |
cvssV3_1
|
Thu, 09 Jan 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Dec 2024 14:00:00 +0000

Status: PUBLISHED
Assigner: Linux
Published: 2024-12-27T13:49:11.401Z
Updated: 2025-05-04T09:54:40.548Z
Reserved: 2024-11-19T17:17:25.004Z
Link: CVE-2024-53165

Updated: 2025-02-11T15:43:51.034Z

Status : Modified
Published: 2024-12-27T14:15:23.583
Modified: 2025-02-11T16:15:40.500
Link: CVE-2024-53165
