Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Don't free uninitialized ksz_irq If something goes wrong at setup, ksz_irq_free() can be called on uninitialized ksz_irq (for example when ksz_ptp_irq_setup() fails). It leads to freeing uninitialized IRQ numbers and/or domains. Use dsa_switch_for_each_user_port_continue_reverse() in the error path to iterate only over the fully initialized ports.
References
- https://git.kernel.org/stable/c/25b62cc5b22c45face094ae3e8717258e46d1d19
- https://git.kernel.org/stable/c/32abbcf4379a0f851d7eb9d4389e7bf5c64bf6c0
- https://git.kernel.org/stable/c/9428654c827fa8d38b898135d26d39ee2d544246
FAQ
What is CVE-2025-68338?
CVE-2025-68338 is a documented vulnerability. In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Don't free uninitialized ksz_irq If something goes wrong at setup, ksz_irq_free() can be called on uninitiali...
How severe is CVE-2025-68338?
CVSS scoring is not yet available for CVE-2025-68338. Check NVD for updates.
Is there a patch for CVE-2025-68338?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.