First published: Thu Apr 03 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: Fix NAPI registration sequence Registering the interrupts for TX or RX DMA Channels prior to registering their respective NAPI callbacks can result in a NULL pointer dereference. This is seen in practice as a random occurrence since it depends on the randomness associated with the generation of traffic by Linux and the reception of traffic from the wire.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
>=6.12.14<6.12.21 | ||
>=6.13.3<6.13.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-22006 has been categorized as moderate due to the potential for a NULL pointer dereference.
To fix CVE-2025-22006, ensure that interrupts for TX or RX DMA Channels are registered after their respective NAPI callbacks.
CVE-2025-22006 affects multiple versions of the Linux kernel, particularly those using the ti: am65-cpsw network driver.
The implications of CVE-2025-22006 include potential system crashes or unexpected behavior due to the NULL pointer dereference.
Yes, an official patch has been released to address CVE-2025-22006 in the Linux kernel.