{"vulnerability": "CVE-2024-57949", "sightings": [{"uuid": "9a05640d-76a2-4b7a-a64d-60f9dbef422e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57949", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113973737061607590", "content": "", "creation_timestamp": "2025-02-09T11:40:12.930247Z"}, {"uuid": "663939d7-aec7-444c-a13c-e4ab010ec874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57949", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhqmatzl3m2q", "content": "", "creation_timestamp": "2025-02-09T12:15:54.777811Z"}, {"uuid": "a53148fe-5cd9-48b1-b7ae-9a09a0aad4ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57949", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhqyhvzgud2o", "content": "", "creation_timestamp": "2025-02-09T15:54:37.026622Z"}, {"uuid": "4e0fdbf2-3d94-4418-bcd3-d28ef81a3402", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57949", "type": "seen", "source": "https://t.me/cvedetector/17549", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57949 - Linux kernel GIC-v3-its Infinite Recursion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57949 \nPublished : Feb. 9, 2025, 12:15 p.m. | 22\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nirqchip/gic-v3-its: Don't enable interrupts in its_irq_set_vcpu_affinity()  \n  \nThe following call-chain leads to enabling interrupts in a nested interrupt  \ndisabled section:  \n  \nirq_set_vcpu_affinity()  \n  irq_get_desc_lock()  \n     raw_spin_lock_irqsave() &lt;---&lt;---&lt;---\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-09T14:19:37.000000Z"}]}