CVE-2026-43372 PUBLISHED

net: dsa: microchip: Fix error path in PTP IRQ setup

Assigner: Linux
Reserved: 01.05.2026 Published: 08.05.2026 Updated: 08.05.2026

In the Linux kernel, the following vulnerability has been resolved:

net: dsa: microchip: Fix error path in PTP IRQ setup

If request_threaded_irq() fails during the PTP message IRQ setup, the newly created IRQ mapping is never disposed. Indeed, the ksz_ptp_irq_setup()'s error path only frees the mappings that were successfully set up.

Dispose the newly created mapping if the associated request_threaded_irq() fails at setup.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 3b5a6115d6ea45df1ea65dc9b832b23db5d593ba to 3704ac6a0d9a78f66a187515a8ca3faedaf01cc5 (excl.)
  • affected from 1ba6da6ca3db76f6a39004fd33a9c990e428515e to e80fef36c676c947072dabeb5803ae59d92ba493 (excl.)
  • affected from d0b8fec8ae50525b57139393d0bb1f446e82ff7e to 6c58a9fdb0d0e1011aa02455d26d6ebea251979b (excl.)
  • affected from d0b8fec8ae50525b57139393d0bb1f446e82ff7e to c2d1d41e0e8ec447d40a5752844fc5fb0b23db27 (excl.)
  • affected from d0b8fec8ae50525b57139393d0bb1f446e82ff7e to 99c8c16a4aad0b37293cae213e15957c573cf79b (excl.)
  • Version ae12e4e0ca231475bcef841c6a6722fa185fd520 is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.18 is affected
  • unaffected from 0 to 6.18 (excl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.78 to 6.12.* (incl.)
  • unaffected from 6.18.19 to 6.18.* (incl.)
  • unaffected from 6.19.9 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References