In the Linux kernel, the following vulnerability has been resolved:
sh: intc: Fix use-after-free bug in registerintccontroller()
In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.