<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 18:24:30 +0000</lastBuildDate>
    <item>
      <title>d2325358-84d9-45ee-aa3b-a41bd9387c9c</title>
      <link>https://vulnerability.circl.lu/sighting/d2325358-84d9-45ee-aa3b-a41bd9387c9c/export</link>
      <description>{"uuid": "d2325358-84d9-45ee-aa3b-a41bd9387c9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50006", "type": "seen", "source": "https://t.me/cvedetector/8541", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50006 - Linux Kernel EXT4 Data Semaphores Deadlock\", \n  \"Content\": \"CVE ID : CVE-2024-50006 \nPublished : Oct. 21, 2024, 7:15 p.m. | 34\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \next4: fix i_data_sem unlock order in ext4_ind_migrate()  \n  \nFuzzing reports a possible deadlock in jbd2_log_wait_commit.  \n  \nThis issue is triggered when an EXT4_IOC_MIGRATE ioctl is set to require  \nsynchronous updates because the file descriptor is opened with O_SYNC.  \nThis can lead to the jbd2_journal_stop() function calling  \njbd2_might_wait_for_commit(), potentially causing a deadlock if the  \nEXT4_IOC_MIGRATE call races with a write(2) system call.  \n  \nThis problem only arises when CONFIG_PROVE_LOCKING is enabled. In this  \ncase, the jbd2_might_wait_for_commit macro locks jbd2_handle in the  \njbd2_journal_stop function while i_data_sem is locked. This triggers  \nlockdep because the jbd2_journal_start function might also lock the same  \njbd2_handle simultaneously.  \n  \nFound by Linux Verification Center (linuxtesting.org) with syzkaller.  \n  \nRule: add \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T21:52:49.000000Z"}</description>
      <content:encoded>{"uuid": "d2325358-84d9-45ee-aa3b-a41bd9387c9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50006", "type": "seen", "source": "https://t.me/cvedetector/8541", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50006 - Linux Kernel EXT4 Data Semaphores Deadlock\", \n  \"Content\": \"CVE ID : CVE-2024-50006 \nPublished : Oct. 21, 2024, 7:15 p.m. | 34\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \next4: fix i_data_sem unlock order in ext4_ind_migrate()  \n  \nFuzzing reports a possible deadlock in jbd2_log_wait_commit.  \n  \nThis issue is triggered when an EXT4_IOC_MIGRATE ioctl is set to require  \nsynchronous updates because the file descriptor is opened with O_SYNC.  \nThis can lead to the jbd2_journal_stop() function calling  \njbd2_might_wait_for_commit(), potentially causing a deadlock if the  \nEXT4_IOC_MIGRATE call races with a write(2) system call.  \n  \nThis problem only arises when CONFIG_PROVE_LOCKING is enabled. In this  \ncase, the jbd2_might_wait_for_commit macro locks jbd2_handle in the  \njbd2_journal_stop function while i_data_sem is locked. This triggers  \nlockdep because the jbd2_journal_start function might also lock the same  \njbd2_handle simultaneously.  \n  \nFound by Linux Verification Center (linuxtesting.org) with syzkaller.  \n  \nRule: add \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T21:52:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d2325358-84d9-45ee-aa3b-a41bd9387c9c/export</guid>
      <pubDate>Mon, 21 Oct 2024 21:52:49 +0000</pubDate>
    </item>
    <item>
      <title>a81c63ec-277e-49ec-8439-8afb3ea7cebe</title>
      <link>https://vulnerability.circl.lu/sighting/a81c63ec-277e-49ec-8439-8afb3ea7cebe/export</link>
      <description>{"uuid": "a81c63ec-277e-49ec-8439-8afb3ea7cebe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50004", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50004\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35\n\n[WHY &amp;amp; HOW]\nMismatch in DCN35 DML2 cause bw validation failed to acquire unexpected DPP pipe to cause\ngrey screen and system hang. Remove EnhancedPrefetchScheduleAccelerationFinal value override\nto match HW spec.\n\n(cherry picked from commit 9dad21f910fcea2bdcff4af46159101d7f9cd8ba)\n\ud83d\udccf Published: 2024-10-21T18:53:58.609Z\n\ud83d\udccf Modified: 2025-01-16T11:53:25.998Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/945dc25eda88b5d6e30c9686dc619ab981c22d0e\n2. https://git.kernel.org/stable/c/4010efc8516899981cc3b57be2d4a2d5d9e50228\n3. https://git.kernel.org/stable/c/0d5e5e8a0aa49ea2163abf128da3b509a6c58286", "creation_timestamp": "2025-01-16T12:55:29.000000Z"}</description>
      <content:encoded>{"uuid": "a81c63ec-277e-49ec-8439-8afb3ea7cebe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50004", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50004\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35\n\n[WHY &amp;amp; HOW]\nMismatch in DCN35 DML2 cause bw validation failed to acquire unexpected DPP pipe to cause\ngrey screen and system hang. Remove EnhancedPrefetchScheduleAccelerationFinal value override\nto match HW spec.\n\n(cherry picked from commit 9dad21f910fcea2bdcff4af46159101d7f9cd8ba)\n\ud83d\udccf Published: 2024-10-21T18:53:58.609Z\n\ud83d\udccf Modified: 2025-01-16T11:53:25.998Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/945dc25eda88b5d6e30c9686dc619ab981c22d0e\n2. https://git.kernel.org/stable/c/4010efc8516899981cc3b57be2d4a2d5d9e50228\n3. https://git.kernel.org/stable/c/0d5e5e8a0aa49ea2163abf128da3b509a6c58286", "creation_timestamp": "2025-01-16T12:55:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a81c63ec-277e-49ec-8439-8afb3ea7cebe/export</guid>
      <pubDate>Thu, 16 Jan 2025 12:55:29 +0000</pubDate>
    </item>
    <item>
      <title>4a0fa0f1-c588-4635-9afb-e937dcf34cf6</title>
      <link>https://vulnerability.circl.lu/sighting/4a0fa0f1-c588-4635-9afb-e937dcf34cf6/export</link>
      <description>{"uuid": "4a0fa0f1-c588-4635-9afb-e937dcf34cf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50009", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2168", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50009\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: amd-pstate: add check for cpufreq_cpu_get's return value\n\ncpufreq_cpu_get may return NULL. To avoid NULL-dereference check it\nand return in case of error.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\ud83d\udccf Published: 2024-10-21T18:54:02.180Z\n\ud83d\udccf Modified: 2025-01-17T15:56:21.546Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/5f250d44b8191d612355dd97b89b37bbc1b5d2cb\n2. https://git.kernel.org/stable/c/5493f9714e4cdaf0ee7cec15899a231400cb1a9f", "creation_timestamp": "2025-01-17T16:57:10.000000Z"}</description>
      <content:encoded>{"uuid": "4a0fa0f1-c588-4635-9afb-e937dcf34cf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50009", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2168", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50009\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: amd-pstate: add check for cpufreq_cpu_get's return value\n\ncpufreq_cpu_get may return NULL. To avoid NULL-dereference check it\nand return in case of error.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\ud83d\udccf Published: 2024-10-21T18:54:02.180Z\n\ud83d\udccf Modified: 2025-01-17T15:56:21.546Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/5f250d44b8191d612355dd97b89b37bbc1b5d2cb\n2. https://git.kernel.org/stable/c/5493f9714e4cdaf0ee7cec15899a231400cb1a9f", "creation_timestamp": "2025-01-17T16:57:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4a0fa0f1-c588-4635-9afb-e937dcf34cf6/export</guid>
      <pubDate>Fri, 17 Jan 2025 16:57:10 +0000</pubDate>
    </item>
    <item>
      <title>0e7da908-ce22-4224-bc86-488f61458e9f</title>
      <link>https://vulnerability.circl.lu/sighting/0e7da908-ce22-4224-bc86-488f61458e9f/export</link>
      <description>{"uuid": "0e7da908-ce22-4224-bc86-488f61458e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50008", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "0e7da908-ce22-4224-bc86-488f61458e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50008", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0e7da908-ce22-4224-bc86-488f61458e9f/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>ca646391-8a03-4575-9ae0-3452e4f0f613</title>
      <link>https://vulnerability.circl.lu/sighting/ca646391-8a03-4575-9ae0-3452e4f0f613/export</link>
      <description>{"uuid": "ca646391-8a03-4575-9ae0-3452e4f0f613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50006", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "ca646391-8a03-4575-9ae0-3452e4f0f613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50006", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ca646391-8a03-4575-9ae0-3452e4f0f613/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>38fad1a7-c0e4-45f0-8ac8-748fe22424ca</title>
      <link>https://vulnerability.circl.lu/sighting/38fad1a7-c0e4-45f0-8ac8-748fe22424ca/export</link>
      <description>{"uuid": "38fad1a7-c0e4-45f0-8ac8-748fe22424ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50007", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "38fad1a7-c0e4-45f0-8ac8-748fe22424ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50007", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/38fad1a7-c0e4-45f0-8ac8-748fe22424ca/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>b3a288d3-7918-47eb-9ea3-918e9ff80b1b</title>
      <link>https://vulnerability.circl.lu/sighting/b3a288d3-7918-47eb-9ea3-918e9ff80b1b/export</link>
      <description>{"uuid": "b3a288d3-7918-47eb-9ea3-918e9ff80b1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50001", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "b3a288d3-7918-47eb-9ea3-918e9ff80b1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50001", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b3a288d3-7918-47eb-9ea3-918e9ff80b1b/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>a8d2fc50-8a8a-4a05-b5f5-2f80f235179f</title>
      <link>https://vulnerability.circl.lu/sighting/a8d2fc50-8a8a-4a05-b5f5-2f80f235179f/export</link>
      <description>{"uuid": "a8d2fc50-8a8a-4a05-b5f5-2f80f235179f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-50003", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "a8d2fc50-8a8a-4a05-b5f5-2f80f235179f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-50003", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a8d2fc50-8a8a-4a05-b5f5-2f80f235179f/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>099230cb-1429-4b0c-8706-d8752f45fd8a</title>
      <link>https://vulnerability.circl.lu/sighting/099230cb-1429-4b0c-8706-d8752f45fd8a/export</link>
      <description>{"uuid": "099230cb-1429-4b0c-8706-d8752f45fd8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-5000", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "099230cb-1429-4b0c-8706-d8752f45fd8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-5000", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/099230cb-1429-4b0c-8706-d8752f45fd8a/export</guid>
      <pubDate>Tue, 17 Mar 2026 12:00:00 +0000</pubDate>
    </item>
    <item>
      <title>8cd59206-4d5c-434b-87b8-78af9886d250</title>
      <link>https://vulnerability.circl.lu/sighting/8cd59206-4d5c-434b-87b8-78af9886d250/export</link>
      <description>{"uuid": "8cd59206-4d5c-434b-87b8-78af9886d250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-50009", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "8cd59206-4d5c-434b-87b8-78af9886d250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-50009", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8cd59206-4d5c-434b-87b8-78af9886d250/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
