-
CVE-2025-68338
- EPSS 0.02%
- Veröffentlicht 23.12.2025 13:58:24
- Zuletzt bearbeitet 23.12.2025 14:51:52
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Don't free uninitialized ksz_irq If something goes wrong at setup, ksz_irq_free() can be called on uninitialized ksz_irq (for example when ksz_ptp_irq_setup() fails). It leads to freeing uninitialized IRQ numbers and/or domains. Use dsa_switch_for_each_user_port_continue_reverse() in the error path to iterate only over the fully initialized ports.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
9428654c827fa8d38b898135d26d39ee2d544246
Version
cc13ab18b201ab630f03511060ba289b70052959
Status
affected
Version <
32abbcf4379a0f851d7eb9d4389e7bf5c64bf6c0
Version
cc13ab18b201ab630f03511060ba289b70052959
Status
affected
Version <
25b62cc5b22c45face094ae3e8717258e46d1d19
Version
cc13ab18b201ab630f03511060ba289b70052959
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.3
Status
affected
Version <
6.3
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.61
Status
unaffected
Version <=
6.17.*
Version
6.17.11
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.058 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|