{"vulnerability": "CVE-2024-42252", "sightings": [{"uuid": "0b0c02c0-6910-49ed-a08c-48db0f4888fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-42252", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "26685fe5-0a03-42e8-80fd-957d46cbbcc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42252", "type": "seen", "source": "https://t.me/cvedetector/2764", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42252 - Linux kernel Closure Bug\", \n  \"Content\": \"CVE ID : CVE-2024-42252 \nPublished : Aug. 8, 2024, 9:15 a.m. | 34\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nclosures: Change BUG_ON() to WARN_ON()  \n  \nIf a BUG_ON() can be hit in the wild, it shouldn't be a BUG_ON()  \n  \nFor reference, this has popped up once in the CI, and we'll need more  \ninfo to debug it:  \n  \n03240 ------------[ cut here ]------------  \n03240 kernel BUG at lib/closure.c:21!  \n03240 kernel BUG at lib/closure.c:21!  \n03240 Internal error: Oops - BUG: 00000000f2000800 [#1] SMP  \n03240 Modules linked in:  \n03240 CPU: 15 PID: 40534 Comm: kworker/u80:1 Not tainted 6.10.0-rc4-ktest-ga56da69799bd #25570  \n03240 Hardware name: linux,dummy-virt (DT)  \n03240 Workqueue: btree_update btree_interior_update_work  \n03240 pstate: 00001005 (nzcv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)  \n03240 pc : closure_put+0x224/0x2a0  \n03240 lr : closure_put+0x24/0x2a0  \n03240 sp : ffff0000d12071c0  \n03240 x29: ffff0000d12071c0 x28: dfff800000000000 x27: ffff0000d1207360  \n03240 x26: 0000000000000040 x25: 0000000000000040 x24: 0000000000000040  \n03240 x23: ffff0000c1f20180 x22: 0000000000000000 x21: ffff0000c1f20168  \n03240 x20: 0000000040000000 x19: ffff0000c1f20140 x18: 0000000000000001  \n03240 x17: 0000000000003aa0 x16: 0000000000003ad0 x15: 1fffe0001c326974  \n03240 x14: 0000000000000a1e x13: 0000000000000000 x12: 1fffe000183e402d  \n03240 x11: ffff6000183e402d x10: dfff800000000000 x9 : ffff6000183e402e  \n03240 x8 : 0000000000000001 x7 : 00009fffe7c1bfd3 x6 : ffff0000c1f2016b  \n03240 x5 : ffff0000c1f20168 x4 : ffff6000183e402e x3 : ffff800081391954  \n03240 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 00000000a8000000  \n03240 Call trace:  \n03240  closure_put+0x224/0x2a0  \n03240  bch2_check_for_deadlock+0x910/0x1028  \n03240  bch2_six_check_for_deadlock+0x1c/0x30  \n03240  six_lock_slowpath.isra.0+0x29c/0xed0  \n03240  six_lock_ip_waiter+0xa8/0xf8  \n03240  __bch2_btree_node_lock_write+0x14c/0x298  \n03240  bch2_trans_lock_write+0x6d4/0xb10  \n03240  __bch2_trans_commit+0x135c/0x5520  \n03240  btree_interior_update_work+0x1248/0x1c10  \n03240  process_scheduled_works+0x53c/0xd90  \n03240  worker_thread+0x370/0x8c8  \n03240  kthread+0x258/0x2e8  \n03240  ret_from_fork+0x10/0x20  \n03240 Code: aa1303e0 d63f0020 a94363f7 17ffff8c (d4210000)  \n03240 ---[ end trace 0000000000000000 ]---  \n03240 Kernel panic - not syncing: Oops - BUG: Fatal exception  \n03240 SMP: stopping secondary CPUs  \n03241 SMP: failed to stop secondary CPUs 13,15  \n03241 Kernel Offset: disabled  \n03241 CPU features: 0x00,00000003,80000008,4240500b  \n03241 Memory Limit: none  \n03241 ---[ end Kernel panic - not syncing: Oops - BUG: Fatal exception ]---  \n03246 ========= FAILED TIMEOUT copygc_torture_no_checksum in 7200s \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-08T12:12:51.000000Z"}]}