<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T16:35:55.900524+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/88c895fc-5f9f-4457-b3d5-71147dda6ca7/export</id>
    <title>88c895fc-5f9f-4457-b3d5-71147dda6ca7</title>
    <updated>2026-05-09T16:35:56.267096+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "88c895fc-5f9f-4457-b3d5-71147dda6ca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43844", "type": "seen", "source": "https://t.me/cvedetector/3430", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43844 - HP Meep Wireless_bug Offload Handler Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43844 \nPublished : Aug. 17, 2024, 10:15 a.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: rtw89: wow: fix GTK offload H2C skbuff issue  \n  \nWe mistakenly put skb too large and that may exceed skb-&amp;gt;end.  \nTherefore, we fix it.  \n  \nskbuff: skb_over_panic: text:ffffffffc09e9a9d len:416 put:204 head:ffff8fba04eca780 data:ffff8fba04eca7e0 tail:0x200 end:0x140 dev:  \n------------[ cut here ]------------  \nkernel BUG at net/core/skbuff.c:192!  \ninvalid opcode: 0000 [#1] PREEMPT SMP PTI  \nCPU: 1 PID: 4747 Comm: kworker/u4:44 Tainted: G           O       6.6.30-02659-gc18865c4dfbd #1 86547039b47e46935493f615ee31d0b2d711d35e  \nHardware name: HP Meep/Meep, BIOS Google_Meep.11297.262.0 03/18/2021  \nWorkqueue: events_unbound async_run_entry_fn  \nRIP: 0010:skb_panic+0x5d/0x60  \nCode: c6 63 8b 8f bb 4c 0f 45 f6 48 c7 c7 4d 89 8b bb 48 89 ce 44 89 d1 41 56 53 41 53 ff b0 c8 00 00 00 e8 27 5f 23 00 48 83 c4 20  0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44  \nRSP: 0018:ffffaa700144bad0 EFLAGS: 00010282  \nRAX: 0000000000000089 RBX: 0000000000000140 RCX: 14432c5aad26c900  \nRDX: 0000000000000000 RSI: 00000000ffffdfff RDI: 0000000000000001  \nRBP: ffffaa700144bae0 R08: 0000000000000000 R09: ffffaa700144b920  \nR10: 00000000ffffdfff R11: ffffffffbc28fbc0 R12: ffff8fba4e57a010  \nR13: 0000000000000000 R14: ffffffffbb8f8b63 R15: 0000000000000000  \nFS:  0000000000000000(0000) GS:ffff8fba7bd00000(0000) knlGS:0000000000000000  \nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033  \nCR2: 00007999c4ad1000 CR3: 000000015503a000 CR4: 0000000000350ee0  \nCall Trace:  \n   \n ? __die_body+0x1f/0x70  \n ? die+0x3d/0x60  \n ? do_trap+0xa4/0x110  \n ? skb_panic+0x5d/0x60  \n ? do_error_trap+0x6d/0x90  \n ? skb_panic+0x5d/0x60  \n ? handle_invalid_op+0x30/0x40  \n ? skb_panic+0x5d/0x60  \n ? exc_invalid_op+0x3c/0x50  \n ? asm_exc_invalid_op+0x16/0x20  \n ? skb_panic+0x5d/0x60  \n skb_put+0x49/0x50  \n rtw89_fw_h2c_wow_gtk_ofld+0xbd/0x220 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5]  \n rtw89_wow_resume+0x31f/0x540 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5]  \n rtw89_ops_resume+0x2b/0xa0 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5]  \n ieee80211_reconfig+0x84/0x13e0 [mac80211 818a894e3b77da6298269c59ed7cdff065a4ed52]  \n ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]  \n ? dev_printk_emit+0x51/0x70  \n ? _dev_info+0x6e/0x90  \n ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]  \n wiphy_resume+0x89/0x180 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]  \n ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]  \n dpm_run_callback+0x3c/0x140  \n device_resume+0x1f9/0x3c0  \n ? __pfx_dpm_watchdog_handler+0x10/0x10  \n async_resume+0x1d/0x30  \n async_run_entry_fn+0x29/0xd0  \n process_scheduled_works+0x1d8/0x3d0  \n worker_thread+0x1fc/0x2f0  \n kthread+0xed/0x110  \n ? __pfx_worker_thread+0x10/0x10  \n ? __pfx_kthread+0x10/0x10  \n ret_from_fork+0x38/0x50  \n ? __pfx_kthread+0x10/0x10  \n ret_from_fork_asm+0x1b/0x30  \n   \nModules linked in: ccm 8021q r8153_ecm cdc_ether usbnet r8152 mii dm_integrity async_xor xor async_tx lz4 lz4_compress zstd zstd_compress zram zsmalloc uinput rfcomm cmac algif_hash rtw89_8922ae(O) algif_skcipher rtw89_8922a(O) af_alg rtw89_pci(O) rtw89_core(O) btusb(O) snd_soc_sst_bxt_da7219_max98357a btbcm(O) snd_soc_hdac_hdmi btintel(O) snd_soc_intel_hda_dsp_common snd_sof_probes btrtl(O) btmtk(O) snd_hda_codec_hdmi snd_soc_dmic uvcvideo videobuf2_vmalloc uvc videobuf2_memops videobuf2_v4l2 videobuf2_common snd_sof_pci_intel_apl snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda soundwire_intel soundwire_generic_allocation snd_sof_intel_hda_mlink soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp mac80211 snd_soc_acpi_intel_match snd_soc_acpi snd_sof snd_sof_utils soundwire_bus s[...]", "creation_timestamp": "2024-08-17T13:10:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/88c895fc-5f9f-4457-b3d5-71147dda6ca7/export"/>
    <published>2024-08-17T13:10:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/67a9bf0e-7fc6-4f62-857c-ad3add902700/export</id>
    <title>67a9bf0e-7fc6-4f62-857c-ad3add902700</title>
    <updated>2026-05-09T16:35:56.263786+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://cve.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "67a9bf0e-7fc6-4f62-857c-ad3add902700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-43844", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/67a9bf0e-7fc6-4f62-857c-ad3add902700/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
</feed>
