<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 23:02:55 +0000</lastBuildDate>
    <item>
      <title>8efa1f90-4a36-4cff-b970-7c6cab6a4910</title>
      <link>https://vulnerability.circl.lu/sighting/8efa1f90-4a36-4cff-b970-7c6cab6a4910/export</link>
      <description>{"uuid": "8efa1f90-4a36-4cff-b970-7c6cab6a4910", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42313", "type": "seen", "source": "https://t.me/cvedetector/3392", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42313 - Qualcomm Venus Linux Kernel Use After Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42313 \nPublished : Aug. 17, 2024, 9:15 a.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nmedia: venus: fix use after free in vdec_close  \n  \nThere appears to be a possible use after free with vdec_close().  \nThe firmware will add buffer release work to the work queue through  \nHFI callbacks as a normal part of decoding. Randomly closing the  \ndecoder device from userspace during normal decoding can incur  \na read after free for inst.  \n  \nFix it by cancelling the work in vdec_close. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-17T12:17:52.000000Z"}</description>
      <content:encoded>{"uuid": "8efa1f90-4a36-4cff-b970-7c6cab6a4910", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42313", "type": "seen", "source": "https://t.me/cvedetector/3392", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42313 - Qualcomm Venus Linux Kernel Use After Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42313 \nPublished : Aug. 17, 2024, 9:15 a.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nmedia: venus: fix use after free in vdec_close  \n  \nThere appears to be a possible use after free with vdec_close().  \nThe firmware will add buffer release work to the work queue through  \nHFI callbacks as a normal part of decoding. Randomly closing the  \ndecoder device from userspace during normal decoding can incur  \na read after free for inst.  \n  \nFix it by cancelling the work in vdec_close. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-17T12:17:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8efa1f90-4a36-4cff-b970-7c6cab6a4910/export</guid>
      <pubDate>Sat, 17 Aug 2024 12:17:52 +0000</pubDate>
    </item>
  </channel>
</rss>
