{"vulnerability": "CVE-2024-57939", "sightings": [{"uuid": "f68a18a0-cf1f-4507-b138-2a5688f6d0ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57939", "type": "seen", "source": "https://t.me/cvedetector/15951", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57939 - RISC-V Linux Sleeping in Invalid Context Memory Corruption\", \n  \"Content\": \"CVE ID : CVE-2024-57939 \nPublished : Jan. 21, 2025, 1:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nriscv: Fix sleeping in invalid context in die()  \n  \ndie() can be called in exception handler, and therefore cannot sleep.  \nHowever, die() takes spinlock_t which can sleep with PREEMPT_RT enabled.  \nThat causes the following warning:  \n  \nBUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48  \nin_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 285, name: mutex  \npreempt_count: 110001, expected: 0  \nRCU nest depth: 0, expected: 0  \nCPU: 0 UID: 0 PID: 285 Comm: mutex Not tainted 6.12.0-rc7-00022-ge19049cf7d56-dirty #234  \nHardware name: riscv-virtio,qemu (DT)  \nCall Trace:  \n    dump_backtrace+0x1c/0x24  \n    show_stack+0x2c/0x38  \n    dump_stack_lvl+0x5a/0x72  \n    dump_stack+0x14/0x1c  \n    __might_resched+0x130/0x13a  \n    rt_spin_lock+0x2a/0x5c  \n    die+0x24/0x112  \n    do_trap_insn_illegal+0xa0/0xea  \n    _new_vmalloc_restore_context_a0+0xcc/0xd8  \nOops - illegal instruction [#1]  \n  \nSwitch to use raw_spinlock_t, which does not sleep even with PREEMPT_RT  \nenabled. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T15:17:35.000000Z"}, {"uuid": "860efe57-9fd3-4b41-aa58-147190cc4c3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57939", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgawqcdubk2p", "content": "", "creation_timestamp": "2025-01-21T13:15:42.934575Z"}, {"uuid": "38a6f7d4-13fe-4d22-8144-7bf08f3d74d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57939", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgay2shdfz2e", "content": "", "creation_timestamp": "2025-01-21T13:39:29.104225Z"}, {"uuid": "8f8bc1cf-283f-4517-9aa5-b6ac9654fadb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57939", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113866341963235598", "content": "", "creation_timestamp": "2025-01-21T12:28:13.921944Z"}, {"uuid": "66299ded-263a-43c8-9f71-a8ba142c1559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57939", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113866581148390646", "content": "", "creation_timestamp": "2025-01-21T13:29:03.380872Z"}, {"uuid": "8de5b4a4-d30f-4086-9dba-92651ebac8bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57939", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}]}