{"vulnerability": "CVE-2024-56701", "sightings": [{"uuid": "2530e882-7b62-4d4c-b0e7-828a07cdd205", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56701", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leebjm5nrs2l", "content": "", "creation_timestamp": "2024-12-28T10:16:25.268867Z"}, {"uuid": "81eb0312-10e8-4bd3-8e91-82d2b7ab7887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56701", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113730191751771062", "content": "", "creation_timestamp": "2024-12-28T11:23:26.599625Z"}, {"uuid": "ba63719a-2d25-425f-85f7-8a5ab782f890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56701", "type": "seen", "source": "https://t.me/cvedetector/13833", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56701 - IBM pSeries POWER9 DTL Access Lock Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56701 \nPublished : Dec. 28, 2024, 10:15 a.m. | 44\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \npowerpc/pseries: Fix dtl_access_lock to be a rw_semaphore  \n  \nThe dtl_access_lock needs to be a rw_sempahore, a sleeping lock, because  \nthe code calls kmalloc() while holding it, which can sleep:  \n  \n  # echo 1 &gt; /proc/powerpc/vcpudispatch_stats  \n  BUG: sleeping function called from invalid context at include/linux/sched/mm.h:337  \n  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 199, name: sh  \n  preempt_count: 1, expected: 0  \n  3 locks held by sh/199:  \n   #0: c00000000a0743f8 (sb_writers#3){.+.+}-{0:0}, at: vfs_write+0x324/0x438  \n   #1: c0000000028c7058 (dtl_enable_mutex){+.+.}-{3:3}, at: vcpudispatch_stats_write+0xd4/0x5f4  \n   #2: c0000000028c70b8 (dtl_access_lock){+.+.}-{2:2}, at: vcpudispatch_stats_write+0x220/0x5f4  \n  CPU: 0 PID: 199 Comm: sh Not tainted 6.10.0-rc4 #152  \n  Hardware name: IBM pSeries (emulated by qemu) POWER9 (raw) 0x4e1202 0xf000005 of:SLOF,HEAD hv:linux,kvm pSeries  \n  Call Trace:  \n    dump_stack_lvl+0x130/0x148 (unreliable)  \n    __might_resched+0x174/0x410  \n    kmem_cache_alloc_noprof+0x340/0x3d0  \n    alloc_dtl_buffers+0x124/0x1ac  \n    vcpudispatch_stats_write+0x2a8/0x5f4  \n    proc_reg_write+0xf4/0x150  \n    vfs_write+0xfc/0x438  \n    ksys_write+0x88/0x148  \n    system_call_exception+0x1c4/0x5a0  \n    system_call_common+0xf4/0x258 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-28T12:05:57.000000Z"}, {"uuid": "24e0c7e4-7ad6-40f6-9234-dd9ed080244d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-56701", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "cc0bc6e7-8b9f-479d-a2df-e8795511d0c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56701", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}]}