CVE-2025-68766
Description
In the Linux kernel, the following vulnerability has been resolved:
irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()
If irq_domain_translate_twocell() sets "hwirq" to >= MCHP_EIC_NIRQ (2) then it results in an out of bounds access.
The code checks for invalid values, but doesn't set the error code. Return -EINVAL in that case, instead of returning success.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing error code in Microchip EIC irqchip driver could lead to out-of-bounds access; fixed by returning -EINVAL.
Root
Cause CVE-2025-68766 is a missing error code in the Microchip External Interrupt Controller (EIC) irqchip driver in the Linux kernel. The function mchp_eic_domain_alloc() checks whether the translated hardware interrupt number (hwirq) is within valid range (less than MCHP_EIC_NIRQ, which is 2), but if the check fails, the function does not set an appropriate error code. As a result, the function returns success (zero) even when an invalid hwirq was provided by irq_domain_translate_twocell() [1], [4].
Exploitation
The vulnerability is triggered during interrupt allocation when a device tree or other source requests an interrupt number that maps to an out-of-range hardware interrupt. The attacker would need the ability to influence the interrupt request, typically through a crafted device tree or by controlling a device that triggers an interrupt allocation with a bad specifier. No authentication is required beyond the ability to cause such an allocation path, which in embedded systems may be reachable from user space via certain device drivers [2].
Impact
If triggered, the valid-range check is bypassed because the error code is not set, allowing the allocation to proceed with an invalid hwirq. This can lead to an out-of-bounds array access when the driver later uses hwirq as an index, potentially causing memory corruption, a system crash, or other unpredictable behavior. The severity is considered low to moderate given the specific conditions required, but it could affect system stability on platforms using the Microchip EIC [3].
Mitigation
The fix, already applied in the Linux kernel stable trees, explicitly returns -EINVAL when the hwirq check fails, ensuring the allocation function properly rejects invalid interrupt numbers [1], [2], [4]. Users and distributors should apply the corresponding patch or update to a kernel version that includes the fix. No known workarounds exist, but the affected code path is limited to systems with Microchip EIC hardware.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- git.kernel.org/stable/c/09efe7cfbf919c4d763bc425473fcfee0dc98356nvd
- git.kernel.org/stable/c/324c60a67c4b9668497940f667db14d216cc7b1bnvd
- git.kernel.org/stable/c/3873afcb57614c1aaa5b6715554d6d1c22cac95anvd
- git.kernel.org/stable/c/7dbc0d40d8347bd9de55c904f59ea44bcc8dedb7nvd
- git.kernel.org/stable/c/c21c606ad398eeb86a0f3aaff9ba4f2665e286c6nvd
- git.kernel.org/stable/c/efd65e2e2fd96f7aaa5cb07d79bbbfcfc80aa552nvd
News mentions
0No linked articles in our index yet.