{"vulnerability": "CVE-2024-46713", "sightings": [{"uuid": "d353240b-a59a-4277-84df-c8e0a15357a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46713", "type": "seen", "source": "https://u1f383.github.io/linux/2024/11/15/a-quick-note-for-perf-cve-2024-46713.html", "content": "", "creation_timestamp": "2024-11-14T23:00:00.000000Z"}, {"uuid": "22c2613b-612a-460c-9625-52a0c7bddda3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46713", "type": "seen", "source": "https://t.me/cvedetector/5616", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46713 - Apache Linux Kernel Mutex Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46713 \nPublished : Sept. 13, 2024, 3:15 p.m. | 39\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nperf/aux: Fix AUX buffer serialization  \n  \nOle reported that event-&gt;mmap_mutex is strictly insufficient to  \nserialize the AUX buffer, add a per RB mutex to fully serialize it.  \n  \nNote that in the lock order comment the perf_event::mmap_mutex order  \nwas already wrong, that is, it nesting under mmap_lock is not new with  \nthis patch. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T17:58:03.000000Z"}, {"uuid": "dd87bc29-2bc3-4764-ad00-143709ca336e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46713", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "19fef8ad-4cd8-470b-9767-306bd36b2de2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-46713", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "c65bfb39-86cb-4af0-ad26-cf90ffffa92b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46713", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11448", "content": "#exploit\n#Kernel_Security\nCVE-2024-46713:\nRace conditions in Linux Kernel perf events\nhttps://binarygecko.com/race-conditions-in-linux-kernel-perf-events\n]-&gt; https://u1f383.github.io/linux/2024/11/15/a-quick-note-for-perf-cve-2024-46713.html", "creation_timestamp": "2024-11-20T18:54:01.000000Z"}, {"uuid": "4aba55be-7931-44ad-93aa-4c3ec75605b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46713", "type": "published-proof-of-concept", "source": "Telegram/oYmpRnsP0n5l9UoNVnmi0Tqagk8hdqptE5SM8rliaeN2ddE", "content": "", "creation_timestamp": "2025-04-19T13:00:06.000000Z"}, {"uuid": "a39b74ec-17db-4f53-b1b5-9be07c077477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46713", "type": "published-proof-of-concept", "source": "Telegram/pSW96i48zX6NP99CfOkIgHqpdLy2hZyXX1e5O2PACcNGgvo", "content": "", "creation_timestamp": "2025-04-19T05:00:07.000000Z"}]}