In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: ti: am65-cpsw-nuss: Fix null pointer dereference for ndev
In the TX completion packet stage of TI SoCs with CPSW2G instance, which
has single external ethernet port, ndev is accessed without being
initialized if no TX packets have been processed. It results into null
pointer dereference, causing kernel to crash. Fix this by having a check
on the number of TX packets which have been processed.
Metrics
Affected Vendors & Products
References
History
Mon, 22 Sep 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Sat, 20 Sep 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 19 Sep 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw-nuss: Fix null pointer dereference for ndev In the TX completion packet stage of TI SoCs with CPSW2G instance, which has single external ethernet port, ndev is accessed without being initialized if no TX packets have been processed. It results into null pointer dereference, causing kernel to crash. Fix this by having a check on the number of TX packets which have been processed. | |
Title | net: ethernet: ti: am65-cpsw-nuss: Fix null pointer dereference for ndev | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-09-29T06:01:09.666Z
Reserved: 2025-04-16T07:20:57.142Z
Link: CVE-2025-39856

No data.

Status : Awaiting Analysis
Published: 2025-09-19T16:15:44.543
Modified: 2025-09-22T21:23:01.543
Link: CVE-2025-39856


Updated: 2025-09-22T09:58:55Z