{"vulnerability": "CVE-2024-50178", "sightings": [{"uuid": "8253c108-ca1c-4a64-b666-83558e4c8620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50178", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113445733318332079", "content": "", "creation_timestamp": "2024-11-08T05:41:57.522551Z"}, {"uuid": "28268092-229f-43bf-9254-17f091662bc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50178", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1938", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50178\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: loongson3: Use raw_smp_processor_id() in do_service_request()\n\nUse raw_smp_processor_id() instead of plain smp_processor_id() in\ndo_service_request(), otherwise we may get some errors with the driver\nenabled:\n\n BUG: using smp_processor_id() in preemptible [00000000] code: (udev-worker)/208\n caller is loongson3_cpufreq_probe+0x5c/0x250 [loongson3_cpufreq]\n\ud83d\udccf Published: 2024-11-08T05:24:00.205Z\n\ud83d\udccf Modified: 2025-01-16T11:53:28.322Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/2f78e4a6d2702ac03c2bf2ed3a0e344e1fa9f967\n2. https://git.kernel.org/stable/c/2b7ec33e534f7a10033a5cf07794acf48b182bbe", "creation_timestamp": "2025-01-16T12:55:27.000000Z"}]}