In the Linux kernel, the following vulnerability has been resolved:
sh: intc: Fix use-after-free bug in registerintccontroller()
In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53165.json",
"cna_assigner": "Linux"
}