<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 01:58:11 +0000</lastBuildDate>
    <item>
      <title>4f24515d-96ed-4c41-8e13-4403890f849e</title>
      <link>https://vulnerability.circl.lu/sighting/4f24515d-96ed-4c41-8e13-4403890f849e/export</link>
      <description>{"uuid": "4f24515d-96ed-4c41-8e13-4403890f849e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42259", "type": "seen", "source": "https://t.me/cvedetector/3154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42259 - Intel DRM Virtual Memory Mapping Boundary Calculation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42259 \nPublished : Aug. 14, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/i915/gem: Fix Virtual Memory mapping boundaries calculation  \n  \nCalculating the size of the mapped area as the lesser value  \nbetween the requested size and the actual size does not consider  \nthe partial mapping offset. This can cause page fault access.  \n  \nFix the calculation of the starting and ending addresses, the  \ntotal size is now deduced from the difference between the end and  \nstart addresses.  \n  \nAdditionally, the calculations have been rewritten in a clearer  \nand more understandable form.  \n  \n[Joonas: Add Requires: tag]  \nRequires: 60a2066c5005 (\"drm/i915/gem: Adjust vma offset for framebuffer mmap offset\")  \n(cherry picked from commit 97b6784753da06d9d40232328efc5c5367e53417) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T18:13:30.000000Z"}</description>
      <content:encoded>{"uuid": "4f24515d-96ed-4c41-8e13-4403890f849e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42259", "type": "seen", "source": "https://t.me/cvedetector/3154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42259 - Intel DRM Virtual Memory Mapping Boundary Calculation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42259 \nPublished : Aug. 14, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/i915/gem: Fix Virtual Memory mapping boundaries calculation  \n  \nCalculating the size of the mapped area as the lesser value  \nbetween the requested size and the actual size does not consider  \nthe partial mapping offset. This can cause page fault access.  \n  \nFix the calculation of the starting and ending addresses, the  \ntotal size is now deduced from the difference between the end and  \nstart addresses.  \n  \nAdditionally, the calculations have been rewritten in a clearer  \nand more understandable form.  \n  \n[Joonas: Add Requires: tag]  \nRequires: 60a2066c5005 (\"drm/i915/gem: Adjust vma offset for framebuffer mmap offset\")  \n(cherry picked from commit 97b6784753da06d9d40232328efc5c5367e53417) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T18:13:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4f24515d-96ed-4c41-8e13-4403890f849e/export</guid>
      <pubDate>Wed, 14 Aug 2024 18:13:30 +0000</pubDate>
    </item>
  </channel>
</rss>
