<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 22 May 2026 06:36:00 +0000</lastBuildDate>
    <item>
      <title>331c9742-70aa-42b5-b97b-1bd9da8d1d73</title>
      <link>https://db.gcve.eu/sighting/331c9742-70aa-42b5-b97b-1bd9da8d1d73/export</link>
      <description>{"uuid": "331c9742-70aa-42b5-b97b-1bd9da8d1d73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50075", "type": "seen", "source": "https://t.me/cvedetector/9233", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50075 - \"Windows Tegra XUSB USB2 Root Hub Early Reflection-Based Information Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2024-50075 \nPublished : Oct. 29, 2024, 1:15 a.m. | 38\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nxhci: tegra: fix checked USB2 port number  \n  \nIf USB virtualizatoin is enabled, USB2 ports are shared between all  \nVirtual Functions. The USB2 port number owned by an USB2 root hub in  \na Virtual Function may be less than total USB2 phy number supported  \nby the Tegra XUSB controller.  \n  \nUsing total USB2 phy number as port number to check all PORTSC values  \nwould cause invalid memory access.  \n  \n[  116.923438] Unable to handle kernel paging request at virtual address 006c622f7665642f  \n...  \n[  117.213640] Call trace:  \n[  117.216783]  tegra_xusb_enter_elpg+0x23c/0x658  \n[  117.222021]  tegra_xusb_runtime_suspend+0x40/0x68  \n[  117.227260]  pm_generic_runtime_suspend+0x30/0x50  \n[  117.232847]  __rpm_callback+0x84/0x3c0  \n[  117.237038]  rpm_suspend+0x2dc/0x740  \n[  117.241229] pm_runtime_work+0xa0/0xb8  \n[  117.245769]  process_scheduled_works+0x24c/0x478  \n[  117.251007]  worker_thread+0x23c/0x328  \n[  117.255547]  kthread+0x104/0x1b0  \n[  117.259389]  ret_from_fork+0x10/0x20  \n[  117.263582] Code: 54000222 f9461ae8 f8747908 b4ffff48 (f9400100) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T03:03:11.000000Z"}</description>
      <content:encoded>{"uuid": "331c9742-70aa-42b5-b97b-1bd9da8d1d73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50075", "type": "seen", "source": "https://t.me/cvedetector/9233", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50075 - \"Windows Tegra XUSB USB2 Root Hub Early Reflection-Based Information Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2024-50075 \nPublished : Oct. 29, 2024, 1:15 a.m. | 38\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nxhci: tegra: fix checked USB2 port number  \n  \nIf USB virtualizatoin is enabled, USB2 ports are shared between all  \nVirtual Functions. The USB2 port number owned by an USB2 root hub in  \na Virtual Function may be less than total USB2 phy number supported  \nby the Tegra XUSB controller.  \n  \nUsing total USB2 phy number as port number to check all PORTSC values  \nwould cause invalid memory access.  \n  \n[  116.923438] Unable to handle kernel paging request at virtual address 006c622f7665642f  \n...  \n[  117.213640] Call trace:  \n[  117.216783]  tegra_xusb_enter_elpg+0x23c/0x658  \n[  117.222021]  tegra_xusb_runtime_suspend+0x40/0x68  \n[  117.227260]  pm_generic_runtime_suspend+0x30/0x50  \n[  117.232847]  __rpm_callback+0x84/0x3c0  \n[  117.237038]  rpm_suspend+0x2dc/0x740  \n[  117.241229] pm_runtime_work+0xa0/0xb8  \n[  117.245769]  process_scheduled_works+0x24c/0x478  \n[  117.251007]  worker_thread+0x23c/0x328  \n[  117.255547]  kthread+0x104/0x1b0  \n[  117.259389]  ret_from_fork+0x10/0x20  \n[  117.263582] Code: 54000222 f9461ae8 f8747908 b4ffff48 (f9400100) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T03:03:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/331c9742-70aa-42b5-b97b-1bd9da8d1d73/export</guid>
      <pubDate>Tue, 29 Oct 2024 03:03:11 +0000</pubDate>
    </item>
  </channel>
</rss>
