<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 12:42:50 +0000</lastBuildDate>
    <item>
      <title>56dc698e-85e9-40db-850b-1d3772c95679</title>
      <link>https://vulnerability.circl.lu/sighting/56dc698e-85e9-40db-850b-1d3772c95679/export</link>
      <description>{"uuid": "56dc698e-85e9-40db-850b-1d3772c95679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45001", "type": "seen", "source": "https://t.me/cvedetector/4869", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45001 - Linux MANA Driver Alignment Vulnerability (Integer Overflow)\", \n  \"Content\": \"CVE ID : CVE-2024-45001 \nPublished : Sept. 4, 2024, 8:15 p.m. | 27\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet: mana: Fix RX buf alloc_size alignment and atomic op panic  \n  \nThe MANA driver's RX buffer alloc_size is passed into napi_build_skb() to  \ncreate SKB. skb_shinfo(skb) is located at the end of skb, and its alignment  \nis affected by the alloc_size passed into napi_build_skb(). The size needs  \nto be aligned properly for better performance and atomic operations.  \nOtherwise, on ARM64 CPU, for certain MTU settings like 4000, atomic  \noperations may panic on the skb_shinfo(skb)-&amp;gt;dataref due to alignment fault.  \n  \nTo fix this bug, add proper alignment to the alloc_size calculation.  \n  \nSample panic info:  \n[  253.298819] Unable to handle kernel paging request at virtual address ffff000129ba5cce  \n[  253.300900] Mem abort info:  \n[  253.301760]   ESR = 0x0000000096000021  \n[  253.302825]   EC = 0x25: DABT (current EL), IL = 32 bits  \n[  253.304268]   SET = 0, FnV = 0  \n[  253.305172]   EA = 0, S1PTW = 0  \n[  253.306103]   FSC = 0x21: alignment fault  \nCall trace:  \n __skb_clone+0xfc/0x198  \n skb_clone+0x78/0xe0  \n raw6_local_deliver+0xfc/0x228  \n ip6_protocol_deliver_rcu+0x80/0x500  \n ip6_input_finish+0x48/0x80  \n ip6_input+0x48/0xc0  \n ip6_sublist_rcv_finish+0x50/0x78  \n ip6_sublist_rcv+0x1cc/0x2b8  \n ipv6_list_rcv+0x100/0x150  \n __netif_receive_skb_list_core+0x180/0x220  \n netif_receive_skb_list_internal+0x198/0x2a8  \n __napi_poll+0x138/0x250  \n net_rx_action+0x148/0x330  \n handle_softirqs+0x12c/0x3a0 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T22:47:40.000000Z"}</description>
      <content:encoded>{"uuid": "56dc698e-85e9-40db-850b-1d3772c95679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45001", "type": "seen", "source": "https://t.me/cvedetector/4869", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45001 - Linux MANA Driver Alignment Vulnerability (Integer Overflow)\", \n  \"Content\": \"CVE ID : CVE-2024-45001 \nPublished : Sept. 4, 2024, 8:15 p.m. | 27\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet: mana: Fix RX buf alloc_size alignment and atomic op panic  \n  \nThe MANA driver's RX buffer alloc_size is passed into napi_build_skb() to  \ncreate SKB. skb_shinfo(skb) is located at the end of skb, and its alignment  \nis affected by the alloc_size passed into napi_build_skb(). The size needs  \nto be aligned properly for better performance and atomic operations.  \nOtherwise, on ARM64 CPU, for certain MTU settings like 4000, atomic  \noperations may panic on the skb_shinfo(skb)-&amp;gt;dataref due to alignment fault.  \n  \nTo fix this bug, add proper alignment to the alloc_size calculation.  \n  \nSample panic info:  \n[  253.298819] Unable to handle kernel paging request at virtual address ffff000129ba5cce  \n[  253.300900] Mem abort info:  \n[  253.301760]   ESR = 0x0000000096000021  \n[  253.302825]   EC = 0x25: DABT (current EL), IL = 32 bits  \n[  253.304268]   SET = 0, FnV = 0  \n[  253.305172]   EA = 0, S1PTW = 0  \n[  253.306103]   FSC = 0x21: alignment fault  \nCall trace:  \n __skb_clone+0xfc/0x198  \n skb_clone+0x78/0xe0  \n raw6_local_deliver+0xfc/0x228  \n ip6_protocol_deliver_rcu+0x80/0x500  \n ip6_input_finish+0x48/0x80  \n ip6_input+0x48/0xc0  \n ip6_sublist_rcv_finish+0x50/0x78  \n ip6_sublist_rcv+0x1cc/0x2b8  \n ipv6_list_rcv+0x100/0x150  \n __netif_receive_skb_list_core+0x180/0x220  \n netif_receive_skb_list_internal+0x198/0x2a8  \n __napi_poll+0x138/0x250  \n net_rx_action+0x148/0x330  \n handle_softirqs+0x12c/0x3a0 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T22:47:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/56dc698e-85e9-40db-850b-1d3772c95679/export</guid>
      <pubDate>Wed, 04 Sep 2024 22:47:40 +0000</pubDate>
    </item>
  </channel>
</rss>
