{"uuid": "f384e380-841a-45a0-856c-8ed92face381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22006", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10177", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22006\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: ti: am65-cpsw: Fix NAPI registration sequence\n\nRegistering the interrupts for TX or RX DMA Channels prior to registering\ntheir respective NAPI callbacks can result in a NULL pointer dereference.\nThis is seen in practice as a random occurrence since it depends on the\nrandomness associated with the generation of traffic by Linux and the\nreception of traffic from the wire.\n\ud83d\udccf Published: 2025-04-03T07:19:07.407Z\n\ud83d\udccf Modified: 2025-04-03T07:19:07.407Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/d4bf956547c38c04fad8d72a961ac4dc00bad000\n2. https://git.kernel.org/stable/c/942557abed7f38b77a47d77b92d448802eefe185\n3. https://git.kernel.org/stable/c/5f079290e5913a0060e059500b7d440990ac1066", "creation_timestamp": "2025-04-03T07:34:08.000000Z"}