{"vulnerability": "CVE-2024-50249", "sightings": [{"uuid": "f42c61fe-91fc-495d-98ff-0bf9e9a80ba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50249", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113453018600648277", "content": "", "creation_timestamp": "2024-11-09T12:34:39.827019Z"}, {"uuid": "63c6b7d2-6147-4a6a-9e3a-7c4725a5e8a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50249", "type": "seen", "source": "https://t.me/cvedetector/10329", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50249 - \"Linux ACPI CPPC Raw Spinlock Wait-Ordering Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-50249 \nPublished : Nov. 9, 2024, 11:15 a.m. | 40\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nACPI: CPPC: Make rmw_lock a raw_spin_lock  \n  \nThe following BUG was triggered:  \n  \n=============================  \n[ BUG: Invalid wait context ]  \n6.12.0-rc2-XXX #406 Not tainted  \n-----------------------------  \nkworker/1:1/62 is trying to lock:  \nffffff8801593030 (&amp;cpc_ptr-&gt;rmw_lock){+.+.}-{3:3}, at: cpc_write+0xcc/0x370  \nother info that might help us debug this:  \ncontext-{5:5}  \n2 locks held by kworker/1:1/62:  \n  #0: ffffff897ef5ec98 (&amp;rq-&gt;__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2c/0x50  \n  #1: ffffff880154e238 (&amp;sg_policy-&gt;update_lock){....}-{2:2}, at: sugov_update_shared+0x3c/0x280  \nstack backtrace:  \nCPU: 1 UID: 0 PID: 62 Comm: kworker/1:1 Not tainted 6.12.0-rc2-g9654bd3e8806 #406  \nWorkqueue:  0x0 (events)  \nCall trace:  \n  dump_backtrace+0xa4/0x130  \n  show_stack+0x20/0x38  \n  dump_stack_lvl+0x90/0xd0  \n  dump_stack+0x18/0x28  \n  __lock_acquire+0x480/0x1ad8  \n  lock_acquire+0x114/0x310  \n  _raw_spin_lock+0x50/0x70  \n  cpc_write+0xcc/0x370  \n  cppc_set_perf+0xa0/0x3a8  \n  cppc_cpufreq_fast_switch+0x40/0xc0  \n  cpufreq_driver_fast_switch+0x4c/0x218  \n  sugov_update_shared+0x234/0x280  \n  update_load_avg+0x6ec/0x7b8  \n  dequeue_entities+0x108/0x830  \n  dequeue_task_fair+0x58/0x408  \n  __schedule+0x4f0/0x1070  \n  schedule+0x54/0x130  \n  worker_thread+0xc0/0x2e8  \n  kthread+0x130/0x148  \n  ret_from_fork+0x10/0x20  \n  \nsugov_update_shared() locks a raw_spinlock while cpc_write() locks a  \nspinlock.  \n  \nTo have a correct wait-type order, update rmw_lock to a raw spinlock and  \nensure that interrupts will be disabled on the CPU holding it.  \n  \n[ rjw: Changelog edits ] \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T13:17:54.000000Z"}]}