Description
In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Don't free uninitialized ksz_irq If something goes wrong at setup, ksz_irq_free() can be called on uninitialized ksz_irq (for example when ksz_ptp_irq_setup() fails). It leads to freeing uninitialized IRQ numbers and/or domains. Use dsa_switch_for_each_user_port_continue_reverse() in the error path to iterate only over the fully initialized ports.
Product status
cc13ab18b201ab630f03511060ba289b70052959 (git) before 9428654c827fa8d38b898135d26d39ee2d544246
cc13ab18b201ab630f03511060ba289b70052959 (git) before 32abbcf4379a0f851d7eb9d4389e7bf5c64bf6c0
cc13ab18b201ab630f03511060ba289b70052959 (git) before 25b62cc5b22c45face094ae3e8717258e46d1d19
6.3
Any version before 6.3
6.12.61 (semver)
6.17.11 (semver)
6.18 (original_commit_for_fix)
References
git.kernel.org/...c/9428654c827fa8d38b898135d26d39ee2d544246
git.kernel.org/...c/32abbcf4379a0f851d7eb9d4389e7bf5c64bf6c0
git.kernel.org/...c/25b62cc5b22c45face094ae3e8717258e46d1d19
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.