CVE-2025-68338
net: dsa: microchip: Don't free uninitialized ksz_irq
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Don't free uninitialized ksz_irq If something goes wrong at setup, ksz_irq_free() can be called on uninitialized ksz_irq (for example when ksz_ptp_irq_setup() fails). It leads to freeing uninitialized IRQ numbers and/or domains. Use dsa_switch_for_each_user_port_continue_reverse() in the error path to iterate only over the fully initialized ports.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 23, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
cc13ab18b201ab630f03511060ba289b70052959 < 9428654c827fa8d38b898135d26d39ee2d544246 cc13ab18b201ab630f03511060ba289b70052959 < 32abbcf4379a0f851d7eb9d4389e7bf5c64bf6c0 cc13ab18b201ab630f03511060ba289b70052959 < 25b62cc5b22c45face094ae3e8717258e46d1d19
Linux / Linux
6.3