{"id":"CVE-2024-53165","summary":"sh: intc: Fix use-after-free bug in register_intc_controller()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsh: intc: Fix use-after-free bug in register_intc_controller()\n\nIn the error handling for this function, d is freed without ever\nremoving it from intc_list which would lead to a use after free.\nTo fix this, let's only add it to the list after everything has\nsucceeded.","modified":"2026-04-02T12:22:55.407475Z","published":"2024-12-27T13:49:11.401Z","related":["USN-7276-1","USN-7277-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53165.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3c7c806b3eafd94ae0f77305a174d63b69ec187c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/588bdec1ff8b81517dbae0ae51c9df52c0b952d3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/63e72e551942642c48456a4134975136cdcb9b3c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6ba6e19912570b2ad68298be0be1dc779014a303"},{"type":"WEB","url":"https://git.kernel.org/stable/c/971b4893457788e0e123ea552f0bb126a5300e61"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8b84dcdf3ab1d414304819f824b10efba64132c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c3f4f4547fb291982f5ef56c048277c4d5ccc4e4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c43df7dae28fb9fce96ef088250c1e3c3a77c527"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d8de818df12d86a1a26a8efd7b4b3b9c6dc3c5cc"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53165.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53165"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2dcec7a988a1895540460a0bf5603bab63d5a3ed"},{"fixed":"3c7c806b3eafd94ae0f77305a174d63b69ec187c"},{"fixed":"d8de818df12d86a1a26a8efd7b4b3b9c6dc3c5cc"},{"fixed":"971b4893457788e0e123ea552f0bb126a5300e61"},{"fixed":"c3f4f4547fb291982f5ef56c048277c4d5ccc4e4"},{"fixed":"c43df7dae28fb9fce96ef088250c1e3c3a77c527"},{"fixed":"b8b84dcdf3ab1d414304819f824b10efba64132c"},{"fixed":"6ba6e19912570b2ad68298be0be1dc779014a303"},{"fixed":"588bdec1ff8b81517dbae0ae51c9df52c0b952d3"},{"fixed":"63e72e551942642c48456a4134975136cdcb9b3c"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53165.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}