We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-22006

net: ethernet: ti: am65-cpsw: Fix NAPI registration sequence



Description

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: Fix NAPI registration sequence Registering the interrupts for TX or RX DMA Channels prior to registering their respective NAPI callbacks can result in a NULL pointer dereference. This is seen in practice as a random occurrence since it depends on the randomness associated with the generation of traffic by Linux and the reception of traffic from the wire.

Reserved 2024-12-29 | Published 2025-04-03 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

82b44cdb0355b5061769ae51909d1c8a1b7f31f2 before d4bf956547c38c04fad8d72a961ac4dc00bad000
affected

faef4c2bebac3c6e4161e66c3d42b85e88013709 before 942557abed7f38b77a47d77b92d448802eefe185
affected

681eb2beb3efe21e630bcc4881595e3b42dd7948 before 5f079290e5913a0060e059500b7d440990ac1066
affected

Default status
unaffected

6.12.14 before 6.12.21
affected

6.13.3 before 6.13.9
affected

References

git.kernel.org/...c/d4bf956547c38c04fad8d72a961ac4dc00bad000

git.kernel.org/...c/942557abed7f38b77a47d77b92d448802eefe185

git.kernel.org/...c/5f079290e5913a0060e059500b7d440990ac1066

cve.org (CVE-2025-22006)

nvd.nist.gov (CVE-2025-22006)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-22006

Support options

Helpdesk Chat, Email, Knowledgebase