{"uuid": "28268092-229f-43bf-9254-17f091662bc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50178", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1938", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50178\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: loongson3: Use raw_smp_processor_id() in do_service_request()\n\nUse raw_smp_processor_id() instead of plain smp_processor_id() in\ndo_service_request(), otherwise we may get some errors with the driver\nenabled:\n\n BUG: using smp_processor_id() in preemptible [00000000] code: (udev-worker)/208\n caller is loongson3_cpufreq_probe+0x5c/0x250 [loongson3_cpufreq]\n\ud83d\udccf Published: 2024-11-08T05:24:00.205Z\n\ud83d\udccf Modified: 2025-01-16T11:53:28.322Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/2f78e4a6d2702ac03c2bf2ed3a0e344e1fa9f967\n2. https://git.kernel.org/stable/c/2b7ec33e534f7a10033a5cf07794acf48b182bbe", "creation_timestamp": "2025-01-16T12:55:27.000000Z"}