CVE-2025-39856

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw-nuss: Fix null pointer dereference for ndev In the TX completion packet stage of TI SoCs with CPSW2G instance, which has single external ethernet port, ndev is accessed without being initialized if no TX packets have been processed. It results into null pointer dereference, causing kernel to crash. Fix this by having a check on the number of TX packets which have been processed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:*

History

11 Dec 2025, 19:35

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/485302905bada953aadfe063320d73c892a66cbb - () https://git.kernel.org/stable/c/485302905bada953aadfe063320d73c892a66cbb - Patch
References () https://git.kernel.org/stable/c/a6099f263e1f408bcc7913c9df24b0677164fc5d - () https://git.kernel.org/stable/c/a6099f263e1f408bcc7913c9df24b0677164fc5d - Patch
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel

19 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-19 16:15

Updated : 2025-12-11 19:35


NVD link : CVE-2025-39856

Mitre link : CVE-2025-39856

CVE.ORG link : CVE-2025-39856


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference