CVE-2025-68220
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ti | netcp | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by standardizing the knav_dma_open_channel function to return NULL on error consistently, preventing crashes. Immediate mitigation involves updating the Linux kernel to a version that includes this fix, as the issue is within the netcp driver implementation. There are no other specific mitigation steps provided.
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's TI netcp ethernet driver. The function knav_dma_open_channel does not consistently return NULL on error as expected; instead, it sometimes returns neither NULL nor ERR_PTR, causing inconsistent error handling. This inconsistency leads to a crash in netcp_free_navigator_resources due to an unhandled fault (alignment exception). The fix standardizes the function to always return NULL on error, preventing the crash.
How can this vulnerability impact me? :
The vulnerability can cause a crash in the Linux kernel when the netcp driver encounters an error opening a DMA channel. This crash results from improper error handling and can lead to system instability or downtime. However, the impact is limited as the affected API is used only in netcp_core.c.