<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T05:00:22.621313+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6aae2116-0666-422a-a30a-78a9f9673a22/export</id>
    <title>6aae2116-0666-422a-a30a-78a9f9673a22</title>
    <updated>2026-05-08T05:00:23.055899+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6aae2116-0666-422a-a30a-78a9f9673a22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-47374", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16498", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-47374\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndma-debug: prevent an error message from causing runtime problems\n\nFor some drivers, that use the DMA API. This error message can be reached\nseveral millions of times per second, causing spam to the kernel's printk\nbuffer and bringing the CPU usage up to 100% (so, it should be rate\nlimited). However, since there is at least one driver that is in the\nmainline and suffers from the error condition, it is more useful to\nerr_printk() here instead of just rate limiting the error message (in hopes\nthat it will make it easier for other drivers that suffer from this issue\nto be spotted).\n\ud83d\udccf Published: 2024-05-21T15:03:38.436Z\n\ud83d\udccf Modified: 2025-05-15T12:32:29.426Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/de4afec2d2946c92c62a15ab341c70b287289e6a\n2. https://git.kernel.org/stable/c/510e1a724ab1bf38150be2c1acabb303f98d0047", "creation_timestamp": "2025-05-15T13:33:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6aae2116-0666-422a-a30a-78a9f9673a22/export"/>
    <published>2025-05-15T13:33:46+00:00</published>
  </entry>
</feed>
