{"vulnerability": "CVE-2024-56709", "sightings": [{"uuid": "05626448-0f3b-4f35-98a3-9f375ed8e5d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56709", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113735233649687880", "content": "", "creation_timestamp": "2024-12-29T08:45:39.822460Z"}, {"uuid": "8bdca0f9-78b5-49d7-a588-4ddeb6deb729", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56709", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3legolj6z432c", "content": "", "creation_timestamp": "2024-12-29T09:15:27.354335Z"}, {"uuid": "1af11ae8-a007-4567-a210-12d31784be6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56709", "type": "seen", "source": "https://t.me/cvedetector/13871", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56709 - \"Linux Kernel io_uring Task Work \u2013 Deadlock Prevention\"\", \n  \"Content\": \"CVE ID : CVE-2024-56709 \nPublished : Dec. 29, 2024, 9:15 a.m. | 24\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nio_uring: check if iowq is killed before queuing  \n  \ntask work can be executed after the task has gone through io_uring  \ntermination, whether it's the final task_work run or the fallback path.  \nIn this case, task work will find -&gt;io_wq being already killed and  \nnull'ed, which is a problem if it then tries to forward the request to  \nio_queue_iowq(). Make io_queue_iowq() fail requests in this case.  \n  \nNote that it also checks PF_KTHREAD, because the user can first close  \na DEFER_TASKRUN ring and shortly after kill the task, in which case  \n-&gt;iowq check would race. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T10:41:23.000000Z"}, {"uuid": "ea258edf-3b5d-4559-87b0-72d3d6b603e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-56709", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}]}