<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T09:24:15.838401+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/56dc698e-85e9-40db-850b-1d3772c95679/export</id>
    <title>56dc698e-85e9-40db-850b-1d3772c95679</title>
    <updated>2026-05-09T09:24:16.190247+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "56dc698e-85e9-40db-850b-1d3772c95679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45001", "type": "seen", "source": "https://t.me/cvedetector/4869", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45001 - Linux MANA Driver Alignment Vulnerability (Integer Overflow)\", \n  \"Content\": \"CVE ID : CVE-2024-45001 \nPublished : Sept. 4, 2024, 8:15 p.m. | 27\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet: mana: Fix RX buf alloc_size alignment and atomic op panic  \n  \nThe MANA driver's RX buffer alloc_size is passed into napi_build_skb() to  \ncreate SKB. skb_shinfo(skb) is located at the end of skb, and its alignment  \nis affected by the alloc_size passed into napi_build_skb(). The size needs  \nto be aligned properly for better performance and atomic operations.  \nOtherwise, on ARM64 CPU, for certain MTU settings like 4000, atomic  \noperations may panic on the skb_shinfo(skb)-&amp;gt;dataref due to alignment fault.  \n  \nTo fix this bug, add proper alignment to the alloc_size calculation.  \n  \nSample panic info:  \n[  253.298819] Unable to handle kernel paging request at virtual address ffff000129ba5cce  \n[  253.300900] Mem abort info:  \n[  253.301760]   ESR = 0x0000000096000021  \n[  253.302825]   EC = 0x25: DABT (current EL), IL = 32 bits  \n[  253.304268]   SET = 0, FnV = 0  \n[  253.305172]   EA = 0, S1PTW = 0  \n[  253.306103]   FSC = 0x21: alignment fault  \nCall trace:  \n __skb_clone+0xfc/0x198  \n skb_clone+0x78/0xe0  \n raw6_local_deliver+0xfc/0x228  \n ip6_protocol_deliver_rcu+0x80/0x500  \n ip6_input_finish+0x48/0x80  \n ip6_input+0x48/0xc0  \n ip6_sublist_rcv_finish+0x50/0x78  \n ip6_sublist_rcv+0x1cc/0x2b8  \n ipv6_list_rcv+0x100/0x150  \n __netif_receive_skb_list_core+0x180/0x220  \n netif_receive_skb_list_internal+0x198/0x2a8  \n __napi_poll+0x138/0x250  \n net_rx_action+0x148/0x330  \n handle_softirqs+0x12c/0x3a0 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T22:47:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/56dc698e-85e9-40db-850b-1d3772c95679/export"/>
    <published>2024-09-04T22:47:40+00:00</published>
  </entry>
</feed>
