<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 13:43:27 +0000</lastBuildDate>
    <item>
      <title>eb2e7d56-114f-4e02-abc2-c8f04801a6e0</title>
      <link>https://vulnerability.circl.lu/sighting/eb2e7d56-114f-4e02-abc2-c8f04801a6e0/export</link>
      <description>{"uuid": "eb2e7d56-114f-4e02-abc2-c8f04801a6e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48865", "type": "seen", "source": "https://t.me/cvedetector/953", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-48865 - Linux Kernel TIPC Null Pointer Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-48865 \nPublished : July 16, 2024, 1:15 p.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ntipc: fix kernel panic when enabling bearer  \n  \nWhen enabling a bearer on a node, a kernel panic is observed:  \n  \n[    4.498085] RIP: 0010:tipc_mon_prep+0x4e/0x130 [tipc]  \n...  \n[    4.520030] Call Trace:  \n[    4.520689]    \n[    4.521236]  tipc_link_build_proto_msg+0x375/0x750 [tipc]  \n[    4.522654]  tipc_link_build_state_msg+0x48/0xc0 [tipc]  \n[    4.524034]  __tipc_node_link_up+0xd7/0x290 [tipc]  \n[    4.525292]  tipc_rcv+0x5da/0x730 [tipc]  \n[    4.526346]  ? __netif_receive_skb_core+0xb7/0xfc0  \n[    4.527601]  tipc_l2_rcv_msg+0x5e/0x90 [tipc]  \n[    4.528737]  __netif_receive_skb_list_core+0x20b/0x260  \n[    4.530068]  netif_receive_skb_list_internal+0x1bf/0x2e0  \n[    4.531450]  ? dev_gro_receive+0x4c2/0x680  \n[    4.532512]  napi_complete_done+0x6f/0x180  \n[    4.533570]  virtnet_poll+0x29c/0x42e [virtio_net]  \n...  \n  \nThe node in question is receiving activate messages in another  \nthread after changing bearer status to allow message sending/  \nreceiving in current thread:  \n  \n         thread 1           |              thread 2  \n         --------           |              --------  \n                            |  \ntipc_enable_bearer()        |  \n  test_and_set_bit_lock()   |  \n    tipc_bearer_xmit_skb()  |  \n                            | tipc_l2_rcv_msg()  \n                            |   tipc_rcv()  \n                            |     __tipc_node_link_up()  \n                            |       tipc_link_build_state_msg()  \n                            |         tipc_link_build_proto_msg()  \n                            |           tipc_mon_prep()  \n                            |           {  \n                            |             ...  \n                            |             // null-pointer dereference  \n                            |             u16 gen = mon-&amp;gt;dom_gen;  \n                            |             ...  \n                            |           }  \n  // Not being executed yet |  \n  tipc_mon_create()         |  \n  {                         |  \n    ...                     |  \n    // allocate             |  \n    mon = kzalloc();        |  \n    ...                     |  \n  }                         |  \n  \nMonitoring pointer in thread 2 is dereferenced before monitoring data  \nis allocated in thread 1. This causes kernel panic.  \n  \nThis commit fixes it by allocating the monitoring data before enabling  \nthe bearer to receive messages. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T16:16:50.000000Z"}</description>
      <content:encoded>{"uuid": "eb2e7d56-114f-4e02-abc2-c8f04801a6e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48865", "type": "seen", "source": "https://t.me/cvedetector/953", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-48865 - Linux Kernel TIPC Null Pointer Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-48865 \nPublished : July 16, 2024, 1:15 p.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ntipc: fix kernel panic when enabling bearer  \n  \nWhen enabling a bearer on a node, a kernel panic is observed:  \n  \n[    4.498085] RIP: 0010:tipc_mon_prep+0x4e/0x130 [tipc]  \n...  \n[    4.520030] Call Trace:  \n[    4.520689]    \n[    4.521236]  tipc_link_build_proto_msg+0x375/0x750 [tipc]  \n[    4.522654]  tipc_link_build_state_msg+0x48/0xc0 [tipc]  \n[    4.524034]  __tipc_node_link_up+0xd7/0x290 [tipc]  \n[    4.525292]  tipc_rcv+0x5da/0x730 [tipc]  \n[    4.526346]  ? __netif_receive_skb_core+0xb7/0xfc0  \n[    4.527601]  tipc_l2_rcv_msg+0x5e/0x90 [tipc]  \n[    4.528737]  __netif_receive_skb_list_core+0x20b/0x260  \n[    4.530068]  netif_receive_skb_list_internal+0x1bf/0x2e0  \n[    4.531450]  ? dev_gro_receive+0x4c2/0x680  \n[    4.532512]  napi_complete_done+0x6f/0x180  \n[    4.533570]  virtnet_poll+0x29c/0x42e [virtio_net]  \n...  \n  \nThe node in question is receiving activate messages in another  \nthread after changing bearer status to allow message sending/  \nreceiving in current thread:  \n  \n         thread 1           |              thread 2  \n         --------           |              --------  \n                            |  \ntipc_enable_bearer()        |  \n  test_and_set_bit_lock()   |  \n    tipc_bearer_xmit_skb()  |  \n                            | tipc_l2_rcv_msg()  \n                            |   tipc_rcv()  \n                            |     __tipc_node_link_up()  \n                            |       tipc_link_build_state_msg()  \n                            |         tipc_link_build_proto_msg()  \n                            |           tipc_mon_prep()  \n                            |           {  \n                            |             ...  \n                            |             // null-pointer dereference  \n                            |             u16 gen = mon-&amp;gt;dom_gen;  \n                            |             ...  \n                            |           }  \n  // Not being executed yet |  \n  tipc_mon_create()         |  \n  {                         |  \n    ...                     |  \n    // allocate             |  \n    mon = kzalloc();        |  \n    ...                     |  \n  }                         |  \n  \nMonitoring pointer in thread 2 is dereferenced before monitoring data  \nis allocated in thread 1. This causes kernel panic.  \n  \nThis commit fixes it by allocating the monitoring data before enabling  \nthe bearer to receive messages. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T16:16:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eb2e7d56-114f-4e02-abc2-c8f04801a6e0/export</guid>
      <pubDate>Tue, 16 Jul 2024 16:16:50 +0000</pubDate>
    </item>
    <item>
      <title>317213eb-edc5-4d51-90f7-1688c37f0c81</title>
      <link>https://vulnerability.circl.lu/sighting/317213eb-edc5-4d51-90f7-1688c37f0c81/export</link>
      <description>{"uuid": "317213eb-edc5-4d51-90f7-1688c37f0c81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2022-48865", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "317213eb-edc5-4d51-90f7-1688c37f0c81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2022-48865", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/317213eb-edc5-4d51-90f7-1688c37f0c81/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
  </channel>
</rss>
