{"vulnerability": "cve-2024-5653", "sightings": [{"uuid": "41484682-d119-45b5-a10c-e6129c62504f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56536", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6mlyr4d25", "content": "", "creation_timestamp": "2024-12-27T14:19:04.998090Z"}, {"uuid": "79b8d59c-bf04-4bb3-b612-d9f60075340b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56539", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6msmdst2f", "content": "", "creation_timestamp": "2024-12-27T14:19:11.962370Z"}, {"uuid": "9bf14de2-4542-4c40-ac16-a03fbe2849a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56531", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3letf26u7tk2j", "content": "", "creation_timestamp": "2025-01-03T10:29:21.739082Z"}, {"uuid": "4dc06d0e-69e7-4089-9170-75305736b70a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56532", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "1e5c37a4-2320-4484-8d75-59e6fb39cb2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56533", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "ffe693c3-7b9a-4b6b-83fd-e3f86ba8c3d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56539", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "0a2b51fc-036f-4690-a575-7597746fa8e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56538", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0397/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "6fc7ace2-247b-4ce3-af26-e232c3a44499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56537", "type": "seen", "source": "https://t.me/cvedetector/13755", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56537 - Xilinx ZynqMP DRM Layer Release NULL Pointer Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56537 \nPublished : Dec. 27, 2024, 2:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm: xlnx: zynqmp_disp: layer may be null while releasing  \n  \nlayer-&gt;info can be null if we have an error on the first layer in  \nzynqmp_disp_create_layers \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T16:00:03.000000Z"}, {"uuid": "f0409f39-5668-4c0b-90c1-2fe4cead1f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56539", "type": "seen", "source": "https://t.me/cvedetector/13749", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56539 - Marvell Mwifiex SSID Field Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56539 \nPublished : Dec. 27, 2024, 2:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan()  \n  \nReplace one-element array with a flexible-array member in `struct  \nmwifiex_ie_types_wildcard_ssid_params` to fix the following warning  \non a MT8173 Chromebook (mt8173-elm-hana):  \n  \n[  356.775250] ------------[ cut here ]------------  \n[  356.784543] memcpy: detected field-spanning write (size 6) of single field \"wildcard_ssid_tlv-&gt;ssid\" at drivers/net/wireless/marvell/mwifiex/scan.c:904 (size 1)  \n[  356.813403] WARNING: CPU: 3 PID: 742 at drivers/net/wireless/marvell/mwifiex/scan.c:904 mwifiex_scan_networks+0x4fc/0xf28 [mwifiex]  \n  \nThe \"(size 6)\" above is exactly the length of the SSID of the network  \nthis device was connected to. The source of the warning looks like:  \n  \n    ssid_len = user_scan_in-&gt;ssid_list[i].ssid_len;  \n    [...]  \n    memcpy(wildcard_ssid_tlv-&gt;ssid,  \n           user_scan_in-&gt;ssid_list[i].ssid, ssid_len);  \n  \nThere is a #define WILDCARD_SSID_TLV_MAX_SIZE that uses sizeof() on this  \nstruct, but it already didn't account for the size of the one-element  \narray, so it doesn't need to be changed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T15:59:56.000000Z"}, {"uuid": "67e31244-1fa9-4c63-bc2b-bb7134f62708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56538", "type": "seen", "source": "https://t.me/cvedetector/13748", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56538 - \"Qualcomm Zynq MP Linux Kernel Use-After-Free Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-56538 \nPublished : Dec. 27, 2024, 2:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm: zynqmp_kms: Unplug DRM device before removal  \n  \nPrevent userspace accesses to the DRM device from causing  \nuse-after-frees by unplugging the device before we remove it. This  \ncauses any further userspace accesses to result in an error without  \nfurther calls into this driver's internals. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T15:59:55.000000Z"}, {"uuid": "2fc20f68-9b61-4cf5-bb19-e1f210cd09a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56536", "type": "seen", "source": "https://t.me/cvedetector/13747", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56536 - Cisco WiFi NULL Pointer Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56536 \nPublished : Dec. 27, 2024, 2:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: cw1200: Fix potential NULL dereference  \n  \nA recent refactoring was identified by static analysis to  \ncause a potential NULL dereference, fix this! \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T15:59:51.000000Z"}, {"uuid": "49907f13-1a4c-42ae-8f2c-0fbc61a710e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56533", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6merwa32l", "content": "", "creation_timestamp": "2024-12-27T14:18:57.439338Z"}, {"uuid": "7575683c-3edd-42c3-b257-52b2abffb662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56534", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6mgzcft2l", "content": "", "creation_timestamp": "2024-12-27T14:18:59.943975Z"}, {"uuid": "8eb42f32-ad57-4a98-af25-60d6c0df146c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56531", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6m7qntg2m", "content": "", "creation_timestamp": "2024-12-27T14:18:52.139106Z"}, {"uuid": "641f6408-1117-4bda-8a92-d898b0391940", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56532", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6mchbpt25", "content": "", "creation_timestamp": "2024-12-27T14:18:55.024727Z"}, {"uuid": "645f0ddf-0909-460e-ac61-f235e21eaa9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56535", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6mjamgv2m", "content": "", "creation_timestamp": "2024-12-27T14:19:02.481858Z"}, {"uuid": "1de648da-8216-4734-9f2d-b0790eb07946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56537", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6moa5xr2k", "content": "", "creation_timestamp": "2024-12-27T14:19:07.333301Z"}, {"uuid": "9dbb1a95-6a52-43e9-9413-08dd90295cc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56538", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6mqi5oj2k", "content": "", "creation_timestamp": "2024-12-27T14:19:09.850443Z"}, {"uuid": "c6196c6e-5469-425c-a764-804acec272da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56539", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113725359559770444", "content": "", "creation_timestamp": "2024-12-27T14:54:32.950969Z"}, {"uuid": "54f953d0-6f09-4a5f-9b84-3cfa623aaa5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56533", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "dc7f532d-b4ee-43cd-92e7-2c4fb5e0b499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56531", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "be968dc1-be44-40d8-8dbf-a6da8b604f91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56538", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/ubuntu-linux-kernel-multiple-vulnerabilities_20260408", "content": "", "creation_timestamp": "2026-04-07T18:00:00.000000Z"}, {"uuid": "d7d4f705-8f37-4208-879c-1ccae85c2c44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56531", "type": "seen", "source": "https://t.me/cvedetector/13760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56531 - ALSA USB Soft Lockup Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-56531 \nPublished : Dec. 27, 2024, 2:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nALSA: caiaq: Use snd_card_free_when_closed() at disconnection  \n  \nThe USB disconnect callback is supposed to be short and not too-long  \nwaiting.  OTOH, the current code uses snd_card_free() at  \ndisconnection, but this waits for the close of all used fds, hence it  \ncan take long.  It eventually blocks the upper layer USB ioctls, which  \nmay trigger a soft lockup.  \n  \nAn easy workaround is to replace snd_card_free() with  \nsnd_card_free_when_closed().  This variant returns immediately while  \nthe release of resources is done asynchronously by the card device  \nrelease at the last close.  \n  \nThis patch also splits the code to the disconnect and the free phases;  \nthe former is called immediately at the USB disconnect callback while  \nthe latter is called from the card destructor. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T16:00:43.000000Z"}, {"uuid": "b68618ee-c51a-4b9e-a24a-bd2028f617b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56535", "type": "seen", "source": "https://t.me/cvedetector/13754", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56535 - \"RTW89 Wi-Fi NULL Pointer Dereference Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-56535 \nPublished : Dec. 27, 2024, 2:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: rtw89: coex: check NULL return of kmalloc in btc_fw_set_monreg()  \n  \nkmalloc may fail, return value might be NULL and will cause  \nNULL pointer dereference. Add check NULL return of kmalloc in  \nbtc_fw_set_monreg(). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T16:00:03.000000Z"}]}