In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: ti: am65-cpsw: Fix NAPI registration sequence
Registering the interrupts for TX or RX DMA Channels prior to registering
their respective NAPI callbacks can result in a NULL pointer dereference.
This is seen in practice as a random occurrence since it depends on the
randomness associated with the generation of traffic by Linux and the
reception of traffic from the wire.
Metrics
Affected Vendors & Products
References
History
Fri, 04 Apr 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 03 Apr 2025 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: Fix NAPI registration sequence Registering the interrupts for TX or RX DMA Channels prior to registering their respective NAPI callbacks can result in a NULL pointer dereference. This is seen in practice as a random occurrence since it depends on the randomness associated with the generation of traffic by Linux and the reception of traffic from the wire. | |
Title | net: ethernet: ti: am65-cpsw: Fix NAPI registration sequence | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-04-03T07:19:07.407Z
Updated: 2025-04-03T07:19:07.407Z
Reserved: 2024-12-29T08:45:45.803Z
Link: CVE-2025-22006

No data.

Status : Awaiting Analysis
Published: 2025-04-03T08:15:16.220
Modified: 2025-04-07T14:18:34.453
Link: CVE-2025-22006
