Description
In the Linux kernel, the following vulnerability has been resolved:

net: dsa: microchip: Fix error path in PTP IRQ setup

If request_threaded_irq() fails during the PTP message IRQ setup, the
newly created IRQ mapping is never disposed. Indeed, the
ksz_ptp_irq_setup()'s error path only frees the mappings that were
successfully set up.

Dispose the newly created mapping if the associated
request_threaded_irq() fails at setup.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the Linux kernel’s microchip Distributed Switch Architecture (DSA) driver. During PTP message interrupt setup, if request_threaded_irq() fails, the newly allocated IRQ mapping is not freed. The error path only cleans up mappings that succeeded, leaving dangling resources. This oversight can lead to an unreleased resource condition, potentially exhausting kernel memory or IRQ table entries and causing a denial of service.

Affected Systems

Systems running Linux kernel versions that include the microchip DSA driver but lack the patch found in commit 3704ac6a0d9a78f66a187515a8ca3faedaf01cc5. The bug is present before the kernel release that implements the fix; all affected distributions need to update to a kernel containing the patch.

Risk and Exploitability

The fix improves resource cleanup; no CVSS score is publicly available and the EPSS score is not provided, indicating low publicly documented exploitation risk. The vulnerability is not listed in the CISA KEV catalog, and no known exploit has been reported. An attacker would need the ability to trigger PTP IRQ setup failures repeatedly, which typically requires privileged or targeted network activity. If successfully exploited, the attacker could exhaust IRQ mappings leading to service disruption, but no remote code execution is possible.

Generated by OpenCVE AI on May 9, 2026 at 01:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel patch that addresses the PTP IRQ setup error, ensuring the system runs a kernel version that contains commit 3704ac6a0d9a78f66a187515a8ca3faedaf01cc5 or later.
  • Disable or unload the microchip DSA driver or PTP functionality if not required, to avoid the affected code path.
  • Monitor kernel logs for repeated request_threaded_irq failures and verify that IRQ mapping counts remain stable following the update.

Generated by OpenCVE AI on May 9, 2026 at 01:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Fix error path in PTP IRQ setup If request_threaded_irq() fails during the PTP message IRQ setup, the newly created IRQ mapping is never disposed. Indeed, the ksz_ptp_irq_setup()'s error path only frees the mappings that were successfully set up. Dispose the newly created mapping if the associated request_threaded_irq() fails at setup.
Title net: dsa: microchip: Fix error path in PTP IRQ setup
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:23.221Z

Reserved: 2026-05-01T14:12:56.006Z

Link: CVE-2026-43372

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:48.313

Modified: 2026-05-08T15:16:48.313

Link: CVE-2026-43372

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43372 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T02:00:19Z

Weaknesses