<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 07:26:28 +0000</lastBuildDate>
    <item>
      <title>6821f7ab-a70c-4182-a99d-4d9f29355a73</title>
      <link>https://vulnerability.circl.lu/sighting/6821f7ab-a70c-4182-a99d-4d9f29355a73/export</link>
      <description>{"uuid": "6821f7ab-a70c-4182-a99d-4d9f29355a73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43881", "type": "seen", "source": "https://t.me/cvedetector/3705", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43881 - \"Qualcomm ath12k WiFi DMA Direction Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-43881 \nPublished : Aug. 21, 2024, 1:15 a.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: ath12k: change DMA direction while mapping reinjected packets  \n  \nFor fragmented packets, ath12k reassembles each fragment as a normal  \npacket and then reinjects it into HW ring. In this case, the DMA  \ndirection should be DMA_TO_DEVICE, not DMA_FROM_DEVICE. Otherwise,  \nan invalid payload may be reinjected into the HW and  \nsubsequently delivered to the host.  \n  \nGiven that arbitrary memory can be allocated to the skb buffer,  \nknowledge about the data contained in the reinjected buffer is lacking.  \nConsequently, there\u2019s a risk of private information being leaked.  \n  \nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00209-QCAHKSWPL_SILICONZ-1 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T04:00:28.000000Z"}</description>
      <content:encoded>{"uuid": "6821f7ab-a70c-4182-a99d-4d9f29355a73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43881", "type": "seen", "source": "https://t.me/cvedetector/3705", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43881 - \"Qualcomm ath12k WiFi DMA Direction Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-43881 \nPublished : Aug. 21, 2024, 1:15 a.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: ath12k: change DMA direction while mapping reinjected packets  \n  \nFor fragmented packets, ath12k reassembles each fragment as a normal  \npacket and then reinjects it into HW ring. In this case, the DMA  \ndirection should be DMA_TO_DEVICE, not DMA_FROM_DEVICE. Otherwise,  \nan invalid payload may be reinjected into the HW and  \nsubsequently delivered to the host.  \n  \nGiven that arbitrary memory can be allocated to the skb buffer,  \nknowledge about the data contained in the reinjected buffer is lacking.  \nConsequently, there\u2019s a risk of private information being leaked.  \n  \nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00209-QCAHKSWPL_SILICONZ-1 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T04:00:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6821f7ab-a70c-4182-a99d-4d9f29355a73/export</guid>
      <pubDate>Wed, 21 Aug 2024 04:00:28 +0000</pubDate>
    </item>
  </channel>
</rss>
