๐Ÿ” CVE Alert

CVE-2025-22006

MEDIUM 5.5

net: ethernet: ti: am65-cpsw: Fix NAPI registration sequence

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: Fix NAPI registration sequence Registering the interrupts for TX or RX DMA Channels prior to registering their respective NAPI callbacks can result in a NULL pointer dereference. This is seen in practice as a random occurrence since it depends on the randomness associated with the generation of traffic by Linux and the reception of traffic from the wire.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 3, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
82b44cdb0355b5061769ae51909d1c8a1b7f31f2 < d4bf956547c38c04fad8d72a961ac4dc00bad000 faef4c2bebac3c6e4161e66c3d42b85e88013709 < 942557abed7f38b77a47d77b92d448802eefe185 681eb2beb3efe21e630bcc4881595e3b42dd7948 < 5f079290e5913a0060e059500b7d440990ac1066
Linux / Linux
6.12.14 < 6.12.21 6.13.3 < 6.13.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d4bf956547c38c04fad8d72a961ac4dc00bad000 git.kernel.org: https://git.kernel.org/stable/c/942557abed7f38b77a47d77b92d448802eefe185 git.kernel.org: https://git.kernel.org/stable/c/5f079290e5913a0060e059500b7d440990ac1066