In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.
https://git.kernel.org/stable/c/d8de818df12d86a1a26a8efd7b4b3b9c6dc3c5cc
https://git.kernel.org/stable/c/c43df7dae28fb9fce96ef088250c1e3c3a77c527
https://git.kernel.org/stable/c/c3f4f4547fb291982f5ef56c048277c4d5ccc4e4
https://git.kernel.org/stable/c/b8b84dcdf3ab1d414304819f824b10efba64132c
https://git.kernel.org/stable/c/971b4893457788e0e123ea552f0bb126a5300e61
https://git.kernel.org/stable/c/6ba6e19912570b2ad68298be0be1dc779014a303
https://git.kernel.org/stable/c/63e72e551942642c48456a4134975136cdcb9b3c
https://git.kernel.org/stable/c/588bdec1ff8b81517dbae0ae51c9df52c0b952d3
https://git.kernel.org/stable/c/3c7c806b3eafd94ae0f77305a174d63b69ec187c