CVE-2026-43372
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/05/2026
Última modificación:
08/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: dsa: microchip: Fix error path in PTP IRQ setup<br />
<br />
If request_threaded_irq() fails during the PTP message IRQ setup, the<br />
newly created IRQ mapping is never disposed. Indeed, the<br />
ksz_ptp_irq_setup()&#39;s error path only frees the mappings that were<br />
successfully set up.<br />
<br />
Dispose the newly created mapping if the associated<br />
request_threaded_irq() fails at setup.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/3704ac6a0d9a78f66a187515a8ca3faedaf01cc5
- https://git.kernel.org/stable/c/6c58a9fdb0d0e1011aa02455d26d6ebea251979b
- https://git.kernel.org/stable/c/99c8c16a4aad0b37293cae213e15957c573cf79b
- https://git.kernel.org/stable/c/c2d1d41e0e8ec447d40a5752844fc5fb0b23db27
- https://git.kernel.org/stable/c/e80fef36c676c947072dabeb5803ae59d92ba493



