Описание
In the Linux kernel, the following vulnerability has been resolved:
sh: intc: Fix use-after-free bug in register_intc_controller()
In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.
In the Linux kernel, the following vulnerability has been resolved:
sh: intc: Fix use-after-free bug in register_intc_controller()
In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-53165
- https://git.kernel.org/stable/c/3c7c806b3eafd94ae0f77305a174d63b69ec187c
- https://git.kernel.org/stable/c/588bdec1ff8b81517dbae0ae51c9df52c0b952d3
- https://git.kernel.org/stable/c/63e72e551942642c48456a4134975136cdcb9b3c
- https://git.kernel.org/stable/c/6ba6e19912570b2ad68298be0be1dc779014a303
- https://git.kernel.org/stable/c/971b4893457788e0e123ea552f0bb126a5300e61
- https://git.kernel.org/stable/c/b8b84dcdf3ab1d414304819f824b10efba64132c
- https://git.kernel.org/stable/c/c3f4f4547fb291982f5ef56c048277c4d5ccc4e4
- https://git.kernel.org/stable/c/c43df7dae28fb9fce96ef088250c1e3c3a77c527
- https://git.kernel.org/stable/c/d8de818df12d86a1a26a8efd7b4b3b9c6dc3c5cc
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.
In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.
In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.
In the Linux kernel, the following vulnerability has been resolved: s ...