<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T17:01:10.034510+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d2325358-84d9-45ee-aa3b-a41bd9387c9c/export</id>
    <title>d2325358-84d9-45ee-aa3b-a41bd9387c9c</title>
    <updated>2026-05-06T17:01:10.283735+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d2325358-84d9-45ee-aa3b-a41bd9387c9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50006", "type": "seen", "source": "https://t.me/cvedetector/8541", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50006 - Linux Kernel EXT4 Data Semaphores Deadlock\", \n  \"Content\": \"CVE ID : CVE-2024-50006 \nPublished : Oct. 21, 2024, 7:15 p.m. | 34\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \next4: fix i_data_sem unlock order in ext4_ind_migrate()  \n  \nFuzzing reports a possible deadlock in jbd2_log_wait_commit.  \n  \nThis issue is triggered when an EXT4_IOC_MIGRATE ioctl is set to require  \nsynchronous updates because the file descriptor is opened with O_SYNC.  \nThis can lead to the jbd2_journal_stop() function calling  \njbd2_might_wait_for_commit(), potentially causing a deadlock if the  \nEXT4_IOC_MIGRATE call races with a write(2) system call.  \n  \nThis problem only arises when CONFIG_PROVE_LOCKING is enabled. In this  \ncase, the jbd2_might_wait_for_commit macro locks jbd2_handle in the  \njbd2_journal_stop function while i_data_sem is locked. This triggers  \nlockdep because the jbd2_journal_start function might also lock the same  \njbd2_handle simultaneously.  \n  \nFound by Linux Verification Center (linuxtesting.org) with syzkaller.  \n  \nRule: add \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T21:52:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d2325358-84d9-45ee-aa3b-a41bd9387c9c/export"/>
    <published>2024-10-21T21:52:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a81c63ec-277e-49ec-8439-8afb3ea7cebe/export</id>
    <title>a81c63ec-277e-49ec-8439-8afb3ea7cebe</title>
    <updated>2026-05-06T17:01:10.283659+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a81c63ec-277e-49ec-8439-8afb3ea7cebe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50004", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50004\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35\n\n[WHY &amp;amp; HOW]\nMismatch in DCN35 DML2 cause bw validation failed to acquire unexpected DPP pipe to cause\ngrey screen and system hang. Remove EnhancedPrefetchScheduleAccelerationFinal value override\nto match HW spec.\n\n(cherry picked from commit 9dad21f910fcea2bdcff4af46159101d7f9cd8ba)\n\ud83d\udccf Published: 2024-10-21T18:53:58.609Z\n\ud83d\udccf Modified: 2025-01-16T11:53:25.998Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/945dc25eda88b5d6e30c9686dc619ab981c22d0e\n2. https://git.kernel.org/stable/c/4010efc8516899981cc3b57be2d4a2d5d9e50228\n3. https://git.kernel.org/stable/c/0d5e5e8a0aa49ea2163abf128da3b509a6c58286", "creation_timestamp": "2025-01-16T12:55:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a81c63ec-277e-49ec-8439-8afb3ea7cebe/export"/>
    <published>2025-01-16T12:55:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a0fa0f1-c588-4635-9afb-e937dcf34cf6/export</id>
    <title>4a0fa0f1-c588-4635-9afb-e937dcf34cf6</title>
    <updated>2026-05-06T17:01:10.283579+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a0fa0f1-c588-4635-9afb-e937dcf34cf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50009", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2168", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50009\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: amd-pstate: add check for cpufreq_cpu_get's return value\n\ncpufreq_cpu_get may return NULL. To avoid NULL-dereference check it\nand return in case of error.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\ud83d\udccf Published: 2024-10-21T18:54:02.180Z\n\ud83d\udccf Modified: 2025-01-17T15:56:21.546Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/5f250d44b8191d612355dd97b89b37bbc1b5d2cb\n2. https://git.kernel.org/stable/c/5493f9714e4cdaf0ee7cec15899a231400cb1a9f", "creation_timestamp": "2025-01-17T16:57:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a0fa0f1-c588-4635-9afb-e937dcf34cf6/export"/>
    <published>2025-01-17T16:57:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0e7da908-ce22-4224-bc86-488f61458e9f/export</id>
    <title>0e7da908-ce22-4224-bc86-488f61458e9f</title>
    <updated>2026-05-06T17:01:10.283502+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0e7da908-ce22-4224-bc86-488f61458e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50008", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0e7da908-ce22-4224-bc86-488f61458e9f/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ca646391-8a03-4575-9ae0-3452e4f0f613/export</id>
    <title>ca646391-8a03-4575-9ae0-3452e4f0f613</title>
    <updated>2026-05-06T17:01:10.283426+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ca646391-8a03-4575-9ae0-3452e4f0f613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50006", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ca646391-8a03-4575-9ae0-3452e4f0f613/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/38fad1a7-c0e4-45f0-8ac8-748fe22424ca/export</id>
    <title>38fad1a7-c0e4-45f0-8ac8-748fe22424ca</title>
    <updated>2026-05-06T17:01:10.283336+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "38fad1a7-c0e4-45f0-8ac8-748fe22424ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50007", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/38fad1a7-c0e4-45f0-8ac8-748fe22424ca/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b3a288d3-7918-47eb-9ea3-918e9ff80b1b/export</id>
    <title>b3a288d3-7918-47eb-9ea3-918e9ff80b1b</title>
    <updated>2026-05-06T17:01:10.282448+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b3a288d3-7918-47eb-9ea3-918e9ff80b1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50001", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b3a288d3-7918-47eb-9ea3-918e9ff80b1b/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a8d2fc50-8a8a-4a05-b5f5-2f80f235179f/export</id>
    <title>a8d2fc50-8a8a-4a05-b5f5-2f80f235179f</title>
    <updated>2026-05-06T17:01:10.281453+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://cve.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "a8d2fc50-8a8a-4a05-b5f5-2f80f235179f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-50003", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a8d2fc50-8a8a-4a05-b5f5-2f80f235179f/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/099230cb-1429-4b0c-8706-d8752f45fd8a/export</id>
    <title>099230cb-1429-4b0c-8706-d8752f45fd8a</title>
    <updated>2026-05-06T17:01:10.281348+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://cve.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "099230cb-1429-4b0c-8706-d8752f45fd8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-5000", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/099230cb-1429-4b0c-8706-d8752f45fd8a/export"/>
    <published>2026-03-17T12:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8cd59206-4d5c-434b-87b8-78af9886d250/export</id>
    <title>8cd59206-4d5c-434b-87b8-78af9886d250</title>
    <updated>2026-05-06T17:01:10.279139+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://cve.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "8cd59206-4d5c-434b-87b8-78af9886d250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-50009", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8cd59206-4d5c-434b-87b8-78af9886d250/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
</feed>
