<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 10:52:49 +0000</lastBuildDate>
    <item>
      <title>4029d234-d9f2-426c-bba9-4535d4466047</title>
      <link>https://db.gcve.eu/sighting/4029d234-d9f2-426c-bba9-4535d4466047/export</link>
      <description>{"uuid": "4029d234-d9f2-426c-bba9-4535d4466047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49971", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1940", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49971\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Increase array size of dummy_boolean\n\n[WHY]\ndml2_core_shared_mode_support and dml_core_mode_support access the third\nelement of dummy_boolean, i.e. hw_debug5 = &amp;amp;s-&amp;gt;dummy_boolean[2], when\ndummy_boolean has size of 2. Any assignment to hw_debug5 causes an\nOVERRUN.\n\n[HOW]\nIncrease dummy_boolean's array size to 3.\n\nThis fixes 2 OVERRUN issues reported by Coverity.\n\ud83d\udccf Published: 2024-10-21T18:02:20.344Z\n\ud83d\udccf Modified: 2025-01-16T11:53:24.847Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e9e48b7bb9cf3b78f0305ef0144aaf61da0a83d8\n2. https://git.kernel.org/stable/c/6d64d39486197083497a01b39e23f2f8474b35d3", "creation_timestamp": "2025-01-16T12:55:29.000000Z"}</description>
      <content:encoded>{"uuid": "4029d234-d9f2-426c-bba9-4535d4466047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49971", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1940", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49971\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Increase array size of dummy_boolean\n\n[WHY]\ndml2_core_shared_mode_support and dml_core_mode_support access the third\nelement of dummy_boolean, i.e. hw_debug5 = &amp;amp;s-&amp;gt;dummy_boolean[2], when\ndummy_boolean has size of 2. Any assignment to hw_debug5 causes an\nOVERRUN.\n\n[HOW]\nIncrease dummy_boolean's array size to 3.\n\nThis fixes 2 OVERRUN issues reported by Coverity.\n\ud83d\udccf Published: 2024-10-21T18:02:20.344Z\n\ud83d\udccf Modified: 2025-01-16T11:53:24.847Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e9e48b7bb9cf3b78f0305ef0144aaf61da0a83d8\n2. https://git.kernel.org/stable/c/6d64d39486197083497a01b39e23f2f8474b35d3", "creation_timestamp": "2025-01-16T12:55:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4029d234-d9f2-426c-bba9-4535d4466047/export</guid>
      <pubDate>Thu, 16 Jan 2025 12:55:29 +0000</pubDate>
    </item>
    <item>
      <title>baf21220-0c52-437b-b232-6c7c4c9e3691</title>
      <link>https://db.gcve.eu/sighting/baf21220-0c52-437b-b232-6c7c4c9e3691/export</link>
      <description>{"uuid": "baf21220-0c52-437b-b232-6c7c4c9e3691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49974", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16649", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49974\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Limit the number of concurrent async COPY operations\n\nNothing appears to limit the number of concurrent async COPY\noperations that clients can start. In addition, AFAICT each async\nCOPY can copy an unlimited number of 4MB chunks, so can run for a\nlong time. Thus IMO async COPY can become a DoS vector.\n\nAdd a restriction mechanism that bounds the number of concurrent\nbackground COPY operations. Start simple and try to be fair -- this\npatch implements a per-namespace limit.\n\nAn async COPY request that occurs while this limit is exceeded gets\nNFS4ERR_DELAY. The requesting client can choose to send the request\nagain after a delay or fall back to a traditional read/write style\ncopy.\n\nIf there is need to make the mechanism more sophisticated, we can\nvisit that in future patches.\n\ud83d\udccf Published: 2024-10-21T18:02:22.392Z\n\ud83d\udccf Modified: 2025-05-16T07:25:07.039Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/9e52ff544e0bfa09ee339fd7b0937ee3c080c24e\n2. https://git.kernel.org/stable/c/43e46ee5efc03990b223f7aa8b77aa9c3d3acfdf\n3. https://git.kernel.org/stable/c/7ea9260874b779637aff6d24c344b8ef4ac862a0\n4. https://git.kernel.org/stable/c/ae267989b7b7933dfedcd26468d0a88fc3a9da9e\n5. https://git.kernel.org/stable/c/b4e21431a0db4854b5023cd5af001be557e6c3db\n6. https://git.kernel.org/stable/c/6a488ad7745b8f64625c6d3a24ce7e448e83f11b\n7. https://git.kernel.org/stable/c/aadc3bbea163b6caaaebfdd2b6c4667fbc726752", "creation_timestamp": "2025-05-16T07:34:00.000000Z"}</description>
      <content:encoded>{"uuid": "baf21220-0c52-437b-b232-6c7c4c9e3691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49974", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16649", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49974\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Limit the number of concurrent async COPY operations\n\nNothing appears to limit the number of concurrent async COPY\noperations that clients can start. In addition, AFAICT each async\nCOPY can copy an unlimited number of 4MB chunks, so can run for a\nlong time. Thus IMO async COPY can become a DoS vector.\n\nAdd a restriction mechanism that bounds the number of concurrent\nbackground COPY operations. Start simple and try to be fair -- this\npatch implements a per-namespace limit.\n\nAn async COPY request that occurs while this limit is exceeded gets\nNFS4ERR_DELAY. The requesting client can choose to send the request\nagain after a delay or fall back to a traditional read/write style\ncopy.\n\nIf there is need to make the mechanism more sophisticated, we can\nvisit that in future patches.\n\ud83d\udccf Published: 2024-10-21T18:02:22.392Z\n\ud83d\udccf Modified: 2025-05-16T07:25:07.039Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/9e52ff544e0bfa09ee339fd7b0937ee3c080c24e\n2. https://git.kernel.org/stable/c/43e46ee5efc03990b223f7aa8b77aa9c3d3acfdf\n3. https://git.kernel.org/stable/c/7ea9260874b779637aff6d24c344b8ef4ac862a0\n4. https://git.kernel.org/stable/c/ae267989b7b7933dfedcd26468d0a88fc3a9da9e\n5. https://git.kernel.org/stable/c/b4e21431a0db4854b5023cd5af001be557e6c3db\n6. https://git.kernel.org/stable/c/6a488ad7745b8f64625c6d3a24ce7e448e83f11b\n7. https://git.kernel.org/stable/c/aadc3bbea163b6caaaebfdd2b6c4667fbc726752", "creation_timestamp": "2025-05-16T07:34:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/baf21220-0c52-437b-b232-6c7c4c9e3691/export</guid>
      <pubDate>Fri, 16 May 2025 07:34:00 +0000</pubDate>
    </item>
    <item>
      <title>315b0e79-0813-47c5-b410-cbc6ebc88558</title>
      <link>https://db.gcve.eu/sighting/315b0e79-0813-47c5-b410-cbc6ebc88558/export</link>
      <description>{"uuid": "315b0e79-0813-47c5-b410-cbc6ebc88558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49975", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "315b0e79-0813-47c5-b410-cbc6ebc88558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49975", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/315b0e79-0813-47c5-b410-cbc6ebc88558/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>284bd400-6fe9-4470-9cde-2eb632f8e256</title>
      <link>https://db.gcve.eu/sighting/284bd400-6fe9-4470-9cde-2eb632f8e256/export</link>
      <description>{"uuid": "284bd400-6fe9-4470-9cde-2eb632f8e256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49973", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "284bd400-6fe9-4470-9cde-2eb632f8e256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49973", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/284bd400-6fe9-4470-9cde-2eb632f8e256/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>4f49680d-80f5-4fdd-b5d4-3b356e34357d</title>
      <link>https://db.gcve.eu/sighting/4f49680d-80f5-4fdd-b5d4-3b356e34357d/export</link>
      <description>{"uuid": "4f49680d-80f5-4fdd-b5d4-3b356e34357d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49971", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "4f49680d-80f5-4fdd-b5d4-3b356e34357d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49971", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4f49680d-80f5-4fdd-b5d4-3b356e34357d/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>4ba62262-ad12-408e-8c09-9c5d14ae8e4d</title>
      <link>https://db.gcve.eu/sighting/4ba62262-ad12-408e-8c09-9c5d14ae8e4d/export</link>
      <description>{"uuid": "4ba62262-ad12-408e-8c09-9c5d14ae8e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49977", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "4ba62262-ad12-408e-8c09-9c5d14ae8e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49977", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4ba62262-ad12-408e-8c09-9c5d14ae8e4d/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>4e72ca1c-1b3d-4bb8-ae32-1bc606c65db5</title>
      <link>https://db.gcve.eu/sighting/4e72ca1c-1b3d-4bb8-ae32-1bc606c65db5/export</link>
      <description>{"uuid": "4e72ca1c-1b3d-4bb8-ae32-1bc606c65db5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49974", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "4e72ca1c-1b3d-4bb8-ae32-1bc606c65db5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49974", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4e72ca1c-1b3d-4bb8-ae32-1bc606c65db5/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>e4accc2e-153b-44b0-baea-138e3dc4e1b5</title>
      <link>https://db.gcve.eu/sighting/e4accc2e-153b-44b0-baea-138e3dc4e1b5/export</link>
      <description>{"uuid": "e4accc2e-153b-44b0-baea-138e3dc4e1b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49970", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "e4accc2e-153b-44b0-baea-138e3dc4e1b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49970", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e4accc2e-153b-44b0-baea-138e3dc4e1b5/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>8f7a747b-1ddb-4116-8e61-a82efb18fb8d</title>
      <link>https://db.gcve.eu/sighting/8f7a747b-1ddb-4116-8e61-a82efb18fb8d/export</link>
      <description>{"uuid": "8f7a747b-1ddb-4116-8e61-a82efb18fb8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-49978", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "8f7a747b-1ddb-4116-8e61-a82efb18fb8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-49978", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8f7a747b-1ddb-4116-8e61-a82efb18fb8d/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>a5e7d57c-4460-4e8f-a76c-ba50821f8e35</title>
      <link>https://db.gcve.eu/sighting/a5e7d57c-4460-4e8f-a76c-ba50821f8e35/export</link>
      <description>{"uuid": "a5e7d57c-4460-4e8f-a76c-ba50821f8e35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-49970", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "a5e7d57c-4460-4e8f-a76c-ba50821f8e35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-49970", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a5e7d57c-4460-4e8f-a76c-ba50821f8e35/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
