{"vulnerability": "CVE-2024-54683", "sightings": [{"uuid": "c3389277-650f-405e-a00e-c86045bcc02d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54683", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs5iiszh2d", "content": "", "creation_timestamp": "2025-01-11T13:17:03.254700Z"}, {"uuid": "1dc471ac-c851-4f77-9a7d-41cb43e56dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54683", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfhtocsvvo2y", "content": "", "creation_timestamp": "2025-01-11T13:44:23.670484Z"}, {"uuid": "bbbcf4a0-d6a1-475b-98aa-4633253b9558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-54683", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "afd61626-58d7-4a22-b171-bad206145d88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-54683", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "0086611b-0c8c-41f1-a23f-4f9665c99f2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54683", "type": "published-proof-of-concept", "source": "https://t.me/cvedetector/15077", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54683 - Linux Kernel netfilter IDLETIMER Locking Dependency Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54683 \nPublished : Jan. 11, 2025, 1:15 p.m. | 35\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnetfilter: IDLETIMER: Fix for possible ABBA deadlock  \n  \nDeletion of the last rule referencing a given idletimer may happen at  \nthe same time as a read of its file in sysfs:  \n  \n| ======================================================  \n| WARNING: possible circular locking dependency detected  \n| 6.12.0-rc7-01692-g5e9a28f41134-dirty #594 Not tainted  \n| ------------------------------------------------------  \n| iptables/3303 is trying to acquire lock:  \n| ffff8881057e04b8 (kn-&gt;active#48){++++}-{0:0}, at: __kernfs_remove+0x20  \n|  \n| but task is already holding lock:  \n| ffffffffa0249068 (list_mutex){+.+.}-{3:3}, at: idletimer_tg_destroy_v]  \n|  \n| which lock already depends on the new lock.  \n  \nA simple reproducer is:  \n  \n| #!/bin/bash  \n|  \n| while true; do  \n|         iptables -A INPUT -i foo -j IDLETIMER --timeout 10 --label \"testme\"  \n|         iptables -D INPUT -i foo -j IDLETIMER --timeout 10 --label \"testme\"  \n| done &amp;  \n| while true; do  \n|         cat /sys/class/xt_idletimer/timers/testme &gt;/dev/null  \n| done  \n  \nAvoid this by freeing list_mutex right after deleting the element from  \nthe list, then continuing with the teardown. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T14:55:33.000000Z"}]}