In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-53165-c311@gregkh/T