{"uuid": "866e23a8-fcab-4693-8250-0511a042ca40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46799", "type": "seen", "source": "https://t.me/cvedetector/5934", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46799 - Ti Am65 CPSW NULL Pointer Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46799 \nPublished : Sept. 18, 2024, 8:15 a.m. | 35\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet: ethernet: ti: am65-cpsw: Fix NULL dereference on XDP_TX  \n  \nIf number of TX queues are set to 1 we get a NULL pointer  \ndereference during XDP_TX.  \n  \n~# ethtool -L eth0 tx 1  \n~# ./xdp-trafficgen udp -A  -a  eth0 -t 2  \nTransmitting on eth0 (ifindex 2)  \n[  241.135257] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000030  \n  \nFix this by using actual TX queues instead of max TX queues  \nwhen picking the TX channel in am65_cpsw_ndo_xdp_xmit(). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T10:52:33.000000Z"}