In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded. CREATE(Triage):(User=admin) CVE-2024-53165 (https://nvd.nist.gov/vuln/detail/CVE-2024-53165)