{"vulnerability": "CVE-2024-50096", "sightings": [{"uuid": "fbae91d2-5607-40ca-a281-b62dfa42716a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50096", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113431555130886058", "content": "", "creation_timestamp": "2024-11-05T17:36:13.192299Z"}, {"uuid": "8e1adb8b-400a-4c9e-a358-5449709fe4e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50096", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "7f6244f9-7daf-4bb0-8024-6963fa7456cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50096", "type": "seen", "source": "https://t.me/cvedetector/9908", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50096 - \"Nouveau DMA Memory Zero-Page Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2024-50096 \nPublished : Nov. 5, 2024, 5:15 p.m. | 32\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error  \n  \nThe `nouveau_dmem_copy_one` function ensures that the copy push command is  \nsent to the device firmware but does not track whether it was executed  \nsuccessfully.  \n  \nIn the case of a copy error (e.g., firmware or hardware failure), the  \ncopy push command will be sent via the firmware channel, and  \n`nouveau_dmem_copy_one` will likely report success, leading to the  \n`migrate_to_ram` function returning a dirty HIGH_USER page to the user.  \n  \nThis can result in a security vulnerability, as a HIGH_USER page that may  \ncontain sensitive or corrupted data could be returned to the user.  \n  \nTo prevent this vulnerability, we allocate a zero page. Thus, in case of  \nan error, a non-dirty (zero) page will be returned to the user. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T18:53:59.000000Z"}]}