<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 11:40:33 +0000</lastBuildDate>
    <item>
      <title>dc493a37-67ca-4559-ac68-a2829d162235</title>
      <link>https://vulnerability.circl.lu/sighting/dc493a37-67ca-4559-ac68-a2829d162235/export</link>
      <description>{"uuid": "dc493a37-67ca-4559-ac68-a2829d162235", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43868", "type": "seen", "source": "https://t.me/cvedetector/3695", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43868 - RISC-V Purgatory Unaligned Memory Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43868 \nPublished : Aug. 21, 2024, 12:15 a.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nriscv/purgatory: align riscv_kernel_entry  \n  \nWhen alignment handling is delegated to the kernel, everything must be  \nword-aligned in purgatory, since the trap handler is then set to the  \nkexec one. Without the alignment, hitting the exception would  \nultimately crash. On other occasions, the kernel's handler would take  \ncare of exceptions.  \nThis has been tested on a JH7110 SoC with oreboot and its SBI delegating  \nunaligned access exceptions and the kernel configured to handle them. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T03:10:10.000000Z"}</description>
      <content:encoded>{"uuid": "dc493a37-67ca-4559-ac68-a2829d162235", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43868", "type": "seen", "source": "https://t.me/cvedetector/3695", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43868 - RISC-V Purgatory Unaligned Memory Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43868 \nPublished : Aug. 21, 2024, 12:15 a.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nriscv/purgatory: align riscv_kernel_entry  \n  \nWhen alignment handling is delegated to the kernel, everything must be  \nword-aligned in purgatory, since the trap handler is then set to the  \nkexec one. Without the alignment, hitting the exception would  \nultimately crash. On other occasions, the kernel's handler would take  \ncare of exceptions.  \nThis has been tested on a JH7110 SoC with oreboot and its SBI delegating  \nunaligned access exceptions and the kernel configured to handle them. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T03:10:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dc493a37-67ca-4559-ac68-a2829d162235/export</guid>
      <pubDate>Wed, 21 Aug 2024 03:10:10 +0000</pubDate>
    </item>
  </channel>
</rss>
