{"vulnerability": "cve-2024-5662", "sightings": [{"uuid": "7caad161-f58c-418a-a8cd-4dc6f5d441f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56626", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:03.000000Z"}, {"uuid": "ecb32746-e7d8-45b0-866c-d987b2173a44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56627", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:03.000000Z"}, {"uuid": "ea001383-b27d-47de-a025-93931d5e9d05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56620", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10682", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56620\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: qcom: Only free platform MSIs when ESI is enabled\n\nOtherwise, it will result in a NULL pointer dereference as below:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000008\nCall trace:\n mutex_lock+0xc/0x54\n platform_device_msi_free_irqs_all+0x14/0x20\n ufs_qcom_remove+0x34/0x48 [ufs_qcom]\n platform_remove+0x28/0x44\n device_remove+0x4c/0x80\n device_release_driver_internal+0xd8/0x178\n driver_detach+0x50/0x9c\n bus_remove_driver+0x6c/0xbc\n driver_unregister+0x30/0x60\n platform_driver_unregister+0x14/0x20\n ufs_qcom_pltform_exit+0x18/0xb94 [ufs_qcom]\n __arm64_sys_delete_module+0x180/0x260\n invoke_syscall+0x44/0x100\n el0_svc_common.constprop.0+0xc0/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xdc\n el0t_64_sync_handler+0xc0/0xc4\n el0t_64_sync+0x190/0x194\n\ud83d\udccf Published: 2024-12-27T14:51:24.239Z\n\ud83d\udccf Modified: 2025-04-07T08:36:56.252Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f16a097047e38dcdd169a15e3eed1b2f2147a2e7\n2. https://git.kernel.org/stable/c/f99cb5f6344ef93777fd3add7979ebf291a852df\n3. https://git.kernel.org/stable/c/64506b3d23a337e98a74b18dcb10c8619365f2bd", "creation_timestamp": "2025-04-07T08:44:49.000000Z"}, {"uuid": "267f3841-5765-4b1a-a2dd-056bb65de24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56621", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbx35u5l22", "content": "", "creation_timestamp": "2024-12-27T15:18:46.514537Z"}, {"uuid": "71d1325a-1dd3-45e3-a0b3-9591d80ed024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56622", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbx5fdqe2e", "content": "", "creation_timestamp": "2024-12-27T15:18:48.885395Z"}, {"uuid": "4a6de8f3-91cd-408b-af75-0ed1efa09ec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56626", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbxgvyho22", "content": "", "creation_timestamp": "2024-12-27T15:18:59.175224Z"}, {"uuid": "e0993cd9-c762-4de8-9911-5867e5013b84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56625", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbxepd6m2c", "content": "", "creation_timestamp": "2024-12-27T15:18:56.800743Z"}, {"uuid": "c6ede315-af6c-4909-bc19-8a32a7ac1bca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56624", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbxbyqkj2o", "content": "", "creation_timestamp": "2024-12-27T15:18:53.796728Z"}, {"uuid": "4a1fa5ce-1c1e-4eba-8f0e-3f6b3552bfbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56628", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbxlfo5b2m", "content": "", "creation_timestamp": "2024-12-27T15:19:04.147083Z"}, {"uuid": "af331328-2039-492b-8907-534ea5ee1167", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56629", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbxofkm52k", "content": "", "creation_timestamp": "2024-12-27T15:19:07.847905Z"}, {"uuid": "f323a35e-6747-41f8-a669-0eb00fd7ba90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56620", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbwyw7nu2e", "content": "", "creation_timestamp": "2024-12-27T15:18:44.077211Z"}, {"uuid": "abd90080-2e28-40c8-b230-d7cf3e7f91ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56627", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbxj4rlz25", "content": "", "creation_timestamp": "2024-12-27T15:19:01.665601Z"}, {"uuid": "08f68746-4497-4256-827a-14a5369b32b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56626", "type": "seen", "source": "https://bsky.app/profile/tamosan.bsky.social/post/3lgttsn45dk2c", "content": "", "creation_timestamp": "2025-01-29T01:43:55.507901Z"}, {"uuid": "59072f54-063e-496a-a109-214195b84efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56627", "type": "seen", "source": "https://bsky.app/profile/tamosan.bsky.social/post/3lgttsn45dk2c", "content": "", "creation_timestamp": "2025-01-29T01:43:55.568763Z"}, {"uuid": "0684d3d3-b2f8-49ae-8dc3-84b2958a9961", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56626", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgrkohjywc2m", "content": "", "creation_timestamp": "2025-01-28T03:55:22.553174Z"}, {"uuid": "29b550b5-73bd-4e90-910a-68a8be435b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56627", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgrkohjywc2m", "content": "", "creation_timestamp": "2025-01-28T03:55:22.622657Z"}, {"uuid": "282ec8fb-40a9-49c5-a8cc-00dca02ef97e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56626", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lhy33sqjyz2u", "content": "", "creation_timestamp": "2025-02-12T11:30:10.150724Z"}, {"uuid": "872204c9-6811-4778-b547-e2c89dfe11b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56627", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lhy33sqjyz2u", "content": "", "creation_timestamp": "2025-02-12T11:30:10.214008Z"}, {"uuid": "89ab3162-fb18-4d2e-bc89-23b87d14a794", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56623", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "169050ca-1183-43ad-889b-97192b0dd60f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56623", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16641", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56623\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix use after free on unload\n\nSystem crash is observed with stack trace warning of use after\nfree. There are 2 signals to tell dpc_thread to terminate (UNLOADING\nflag and kthread_stop).\n\nOn setting the UNLOADING flag when dpc_thread happens to run at the time\nand sees the flag, this causes dpc_thread to exit and clean up\nitself. When kthread_stop is called for final cleanup, this causes use\nafter free.\n\nRemove UNLOADING signal to terminate dpc_thread.  Use the kthread_stop\nas the main signal to exit dpc_thread.\n\n[596663.812935] kernel BUG at mm/slub.c:294!\n[596663.812950] invalid opcode: 0000 [#1] SMP PTI\n[596663.812957] CPU: 13 PID: 1475935 Comm: rmmod Kdump: loaded Tainted: G          IOE    --------- -  - 4.18.0-240.el8.x86_64 #1\n[596663.812960] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 08/20/2012\n[596663.812974] RIP: 0010:__slab_free+0x17d/0x360\n\n...\n[596663.813008] Call Trace:\n[596663.813022]  ? __dentry_kill+0x121/0x170\n[596663.813030]  ? _cond_resched+0x15/0x30\n[596663.813034]  ? _cond_resched+0x15/0x30\n[596663.813039]  ? wait_for_completion+0x35/0x190\n[596663.813048]  ? try_to_wake_up+0x63/0x540\n[596663.813055]  free_task+0x5a/0x60\n[596663.813061]  kthread_stop+0xf3/0x100\n[596663.813103]  qla2x00_remove_one+0x284/0x440 [qla2xxx]\n\ud83d\udccf Published: 2024-12-27T14:51:26.484Z\n\ud83d\udccf Modified: 2025-05-16T07:25:16.835Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/12f04fc8580eafb0510f805749553eb6213f323e\n2. https://git.kernel.org/stable/c/ca36d9d53745d5ec8946ef85006d4da605ea7c54\n3. https://git.kernel.org/stable/c/b3e6f25176f248762a24d25ab8cf8c5e90874f80\n4. https://git.kernel.org/stable/c/15369e774f27ec790f207de87c0b541e3f90b22d\n5. https://git.kernel.org/stable/c/6abf16d3c915b2feb68c1c8b25fcb71b13f98478\n6. https://git.kernel.org/stable/c/07c903db0a2ff84b68efa1a74a4de353ea591eb0", "creation_timestamp": "2025-05-16T07:33:49.000000Z"}, {"uuid": "aa821087-3ac6-4ce2-81de-53ffdbd6ff6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56623", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecbx7ht3w2a", "content": "", "creation_timestamp": "2024-12-27T15:18:51.129655Z"}, {"uuid": "b2d03cf4-7b36-4052-9d07-efe7acefdb0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56626", "type": "seen", "source": "https://bsky.app/profile/poteto.jp/post/3lguz7jqnok2j", "content": "", "creation_timestamp": "2025-01-29T12:53:20.288855Z"}, {"uuid": "de7d9ddf-6ee1-46f4-b505-325818f4ad6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56627", "type": "seen", "source": "https://bsky.app/profile/poteto.jp/post/3lguz7jqnok2j", "content": "", "creation_timestamp": "2025-01-29T12:53:20.329924Z"}, {"uuid": "55a42a6f-5473-4d59-9f0e-418c4366e58e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56626", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lgtbnpyxi42u", "content": "", "creation_timestamp": "2025-01-28T20:19:03.770800Z"}, {"uuid": "9ba62043-588b-423f-8905-406a36573333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56627", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lgtbnpyxi42u", "content": "", "creation_timestamp": "2025-01-28T20:19:03.831599Z"}, {"uuid": "e8153491-3318-40fe-ac71-5cc25bd0f8c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56626", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgrt53tdls23", "content": "", "creation_timestamp": "2025-01-28T06:26:33.139505Z"}, {"uuid": "2ae5fb0c-9cb0-4809-93a1-74837a918814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56627", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgrt53tdls23", "content": "", "creation_timestamp": "2025-01-28T06:26:33.195115Z"}, {"uuid": "cda0a75c-90eb-4613-b43b-0165a2386232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-56626", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgrtlpgqp223", "content": "", "creation_timestamp": "2025-01-28T06:34:43.556337Z"}, {"uuid": "ef8d58be-dba3-46c0-9ef0-0e30de38306f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-56627", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgrtlpgqp223", "content": "", "creation_timestamp": "2025-01-28T06:34:43.605482Z"}, {"uuid": "50f313f9-b072-4463-8bd0-f0b87d567110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56629", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "4ade172a-227b-41f8-b375-d2b78b6a349e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56623", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}]}