-
CVE-2025-68338
- EPSS 0.03%
- Veröffentlicht 23.12.2025 13:58:24
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
net: dsa: microchip: Don't free uninitialized ksz_irq
In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Don't free uninitialized ksz_irq If something goes wrong at setup, ksz_irq_free() can be called on uninitialized ksz_irq (for example when ksz_ptp_irq_setup() fails). It leads to freeing uninitialized IRQ numbers and/or domains. Use dsa_switch_for_each_user_port_continue_reverse() in the error path to iterate only over the fully initialized ports.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
cc13ab18b201ab630f03511060ba289b70052959
Version <
9428654c827fa8d38b898135d26d39ee2d544246
Status
affected
Version
cc13ab18b201ab630f03511060ba289b70052959
Version <
32abbcf4379a0f851d7eb9d4389e7bf5c64bf6c0
Status
affected
Version
cc13ab18b201ab630f03511060ba289b70052959
Version <
25b62cc5b22c45face094ae3e8717258e46d1d19
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.3
Status
affected
Version
0
Version <
6.3
Status
unaffected
Version <=
6.12.*
Version
6.12.61
Status
unaffected
Version <=
6.17.*
Version
6.17.11
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.092 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|