{"vulnerability": "CVE-2024-57916", "sightings": [{"uuid": "0bba6f20-5b53-4899-97b3-f4fd4b2c37a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57916", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2338", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57916\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling\n\nResolve kernel panic caused by improper handling of IRQs while\naccessing GPIO values. This is done by replacing generic_handle_irq with\nhandle_nested_irq.\n\ud83d\udccf Published: 2025-01-19T11:52:37.128Z\n\ud83d\udccf Modified: 2025-01-19T11:52:37.128Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/79aef6187e16b2d32307c8ff610e9e04f7f86e1f\n2. https://git.kernel.org/stable/c/25692750c0259c5b65afec467d97201a485e8a00\n3. https://git.kernel.org/stable/c/47d3749ec0cb56b7b98917c190a8c10cb54216fd\n4. https://git.kernel.org/stable/c/194f9f94a5169547d682e9bbcc5ae6d18a564735", "creation_timestamp": "2025-01-19T11:58:33.000000Z"}, {"uuid": "fc718ec2-0ca2-4f70-9f08-7f96f312db82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57916", "type": "seen", "source": "https://t.me/cvedetector/15863", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57916 - Microchip Linux PCI1xxxx GPIO Nested IRQ Handling Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57916 \nPublished : Jan. 19, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nmisc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling  \n  \nResolve kernel panic caused by improper handling of IRQs while  \naccessing GPIO values. This is done by replacing generic_handle_irq with  \nhandle_nested_irq. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-19T13:58:40.000000Z"}, {"uuid": "f1c83b75-3d85-4751-8adf-d015a504ab09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57916", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lg3shygigy2f", "content": "", "creation_timestamp": "2025-01-19T12:16:10.138384Z"}]}