CVE-2026-43372

Published: Mag 08, 2026 Last Modified: Mag 08, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

net: dsa: microchip: Fix error path in PTP IRQ setup

If request_threaded_irq() fails during the PTP message IRQ setup, the
newly created IRQ mapping is never disposed. Indeed, the
ksz_ptp_irq_setup()'s error path only frees the mappings that were
successfully set up.

Dispose the newly created mapping if the associated
request_threaded_irq() fails at setup.

https://git.kernel.org/stable/c/3704ac6a0d9a78f66a187515a8ca3faedaf01cc5
https://git.kernel.org/stable/c/6c58a9fdb0d0e1011aa02455d26d6ebea251979b
https://git.kernel.org/stable/c/99c8c16a4aad0b37293cae213e15957c573cf79b
https://git.kernel.org/stable/c/c2d1d41e0e8ec447d40a5752844fc5fb0b23db27
https://git.kernel.org/stable/c/e80fef36c676c947072dabeb5803ae59d92ba493