{"uuid": "6a989d27-90f1-4ab5-b080-0d42b32a88fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-42249", "type": "seen", "source": "https://t.me/cvedetector/2701", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42249 - Linux Kernel SPI Corrupting Message Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42249 \nPublished : Aug. 7, 2024, 4:15 p.m. | 15\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nspi: don't unoptimize message in spi_async()  \n  \nCalling spi_maybe_unoptimize_message() in spi_async() is wrong because  \nthe message is likely to be in the queue and not transferred yet. This  \ncan corrupt the message while it is being used by the controller driver.  \n  \nspi_maybe_unoptimize_message() is already called in the correct place  \nin spi_finalize_current_message() to balance the call to  \nspi_maybe_optimize_message() in spi_async(). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T18:38:39.000000Z"}