We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: Fix NAPI registration sequence Registering the interrupts for TX or RX DMA Channels prior to registering their respective NAPI callbacks can result in a NULL pointer dereference. This is seen in practice as a random occurrence since it depends on the randomness associated with the generation of traffic by Linux and the reception of traffic from the wire.
Reserved 2024-12-29 | Published 2025-04-03 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/d4bf956547c38c04fad8d72a961ac4dc00bad000
git.kernel.org/...c/942557abed7f38b77a47d77b92d448802eefe185
git.kernel.org/...c/5f079290e5913a0060e059500b7d440990ac1066
Support options