<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 00:43:55 +0000</lastBuildDate>
    <item>
      <title>ddd8a540-4afc-472b-8f25-e352f8767bb8</title>
      <link>https://vulnerability.circl.lu/sighting/ddd8a540-4afc-472b-8f25-e352f8767bb8/export</link>
      <description>{"uuid": "ddd8a540-4afc-472b-8f25-e352f8767bb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44967", "type": "seen", "source": "https://t.me/cvedetector/4829", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44967 - MGA G200 DRM Improper Resource Deallocation\", \n  \"Content\": \"CVE ID : CVE-2024-44967 \nPublished : Sept. 4, 2024, 7:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/mgag200: Bind I2C lifetime to DRM device  \n  \nManaged cleanup with devm_add_action_or_reset() will release the I2C  \nadapter when the underlying Linux device goes away. But the connector  \nstill refers to it, so this cleanup leaves behind a stale pointer  \nin struct drm_connector.ddc.  \n  \nBind the lifetime of the I2C adapter to the connector's lifetime by  \nusing DRM's managed release. When the DRM device goes away (after  \nthe Linux device) DRM will first clean up the connector and then  \nclean up the I2C adapter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T21:56:04.000000Z"}</description>
      <content:encoded>{"uuid": "ddd8a540-4afc-472b-8f25-e352f8767bb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44967", "type": "seen", "source": "https://t.me/cvedetector/4829", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44967 - MGA G200 DRM Improper Resource Deallocation\", \n  \"Content\": \"CVE ID : CVE-2024-44967 \nPublished : Sept. 4, 2024, 7:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/mgag200: Bind I2C lifetime to DRM device  \n  \nManaged cleanup with devm_add_action_or_reset() will release the I2C  \nadapter when the underlying Linux device goes away. But the connector  \nstill refers to it, so this cleanup leaves behind a stale pointer  \nin struct drm_connector.ddc.  \n  \nBind the lifetime of the I2C adapter to the connector's lifetime by  \nusing DRM's managed release. When the DRM device goes away (after  \nthe Linux device) DRM will first clean up the connector and then  \nclean up the I2C adapter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T21:56:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ddd8a540-4afc-472b-8f25-e352f8767bb8/export</guid>
      <pubDate>Wed, 04 Sep 2024 21:56:04 +0000</pubDate>
    </item>
  </channel>
</rss>
