{"vulnerability": "CVE-2024-56744", "sightings": [{"uuid": "c185e942-115c-4a99-ba36-cc4c8bbbb74d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56744", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3legyogm3zn22", "content": "", "creation_timestamp": "2024-12-29T12:16:02.877196Z"}, {"uuid": "fffd189e-704a-4581-a520-d5ea375a25a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56744", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113736155699380786", "content": "", "creation_timestamp": "2024-12-29T12:40:09.467986Z"}, {"uuid": "4db1a3ec-0478-407f-8036-94c7cacece71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56744", "type": "seen", "source": "https://t.me/cvedetector/13893", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56744 - \"F2FS Linux Kernel Deadlock Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-56744 \nPublished : Dec. 29, 2024, 12:15 p.m. | 44\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nf2fs: fix to avoid potential deadlock in f2fs_record_stop_reason()  \n  \nsyzbot reports deadlock issue of f2fs as below:  \n  \n======================================================  \nWARNING: possible circular locking dependency detected  \n6.12.0-rc3-syzkaller-00087-gc964ced77262 #0 Not tainted  \n------------------------------------------------------  \nkswapd0/79 is trying to acquire lock:  \nffff888011824088 (&amp;sbi-&gt;sb_lock){++++}-{3:3}, at: f2fs_down_write fs/f2fs/f2fs.h:2199 [inline]  \nffff888011824088 (&amp;sbi-&gt;sb_lock){++++}-{3:3}, at: f2fs_record_stop_reason+0x52/0x1d0 fs/f2fs/super.c:4068  \n  \nbut task is already holding lock:  \nffff88804bd92610 (sb_internal#2){.+.+}-{0:0}, at: f2fs_evict_inode+0x662/0x15c0 fs/f2fs/inode.c:842  \n  \nwhich lock already depends on the new lock.  \n  \nthe existing dependency chain (in reverse order) is:  \n  \n-&gt; #2 (sb_internal#2){.+.+}-{0:0}:  \n       lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825  \n       percpu_down_read include/linux/percpu-rwsem.h:51 [inline]  \n       __sb_start_write include/linux/fs.h:1716 [inline]  \n       sb_start_intwrite+0x4d/0x1c0 include/linux/fs.h:1899  \n       f2fs_evict_inode+0x662/0x15c0 fs/f2fs/inode.c:842  \n       evict+0x4e8/0x9b0 fs/inode.c:725  \n       f2fs_evict_inode+0x1a4/0x15c0 fs/f2fs/inode.c:807  \n       evict+0x4e8/0x9b0 fs/inode.c:725  \n       dispose_list fs/inode.c:774 [inline]  \n       prune_icache_sb+0x239/0x2f0 fs/inode.c:963  \n       super_cache_scan+0x38c/0x4b0 fs/super.c:223  \n       do_shrink_slab+0x701/0x1160 mm/shrinker.c:435  \n       shrink_slab+0x1093/0x14d0 mm/shrinker.c:662  \n       shrink_one+0x43b/0x850 mm/vmscan.c:4818  \n       shrink_many mm/vmscan.c:4879 [inline]  \n       lru_gen_shrink_node mm/vmscan.c:4957 [inline]  \n       shrink_node+0x3799/0x3de0 mm/vmscan.c:5937  \n       kswapd_shrink_node mm/vmscan.c:6765 [inline]  \n       balance_pgdat mm/vmscan.c:6957 [inline]  \n       kswapd+0x1ca3/0x3700 mm/vmscan.c:7226  \n       kthread+0x2f0/0x390 kernel/kthread.c:389  \n       ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147  \n       ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244  \n  \n-&gt; #1 (fs_reclaim){+.+.}-{0:0}:  \n       lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825  \n       __fs_reclaim_acquire mm/page_alloc.c:3834 [inline]  \n       fs_reclaim_acquire+0x88/0x130 mm/page_alloc.c:3848  \n       might_alloc include/linux/sched/mm.h:318 [inline]  \n       prepare_alloc_pages+0x147/0x5b0 mm/page_alloc.c:4493  \n       __alloc_pages_noprof+0x16f/0x710 mm/page_alloc.c:4722  \n       alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265  \n       alloc_pages_noprof mm/mempolicy.c:2345 [inline]  \n       folio_alloc_noprof+0x128/0x180 mm/mempolicy.c:2352  \n       filemap_alloc_folio_noprof+0xdf/0x500 mm/filemap.c:1010  \n       do_read_cache_folio+0x2eb/0x850 mm/filemap.c:3787  \n       read_mapping_folio include/linux/pagemap.h:1011 [inline]  \n       f2fs_commit_super+0x3c0/0x7d0 fs/f2fs/super.c:4032  \n       f2fs_record_stop_reason+0x13b/0x1d0 fs/f2fs/super.c:4079  \n       f2fs_handle_critical_error+0x2ac/0x5c0 fs/f2fs/super.c:4174  \n       f2fs_write_inode+0x35f/0x4d0 fs/f2fs/inode.c:785  \n       write_inode fs/fs-writeback.c:1503 [inline]  \n       __writeback_single_inode+0x711/0x10d0 fs/fs-writeback.c:1723  \n       writeback_single_inode+0x1f3/0x660 fs/fs-writeback.c:1779  \n       sync_inode_metadata+0xc4/0x120 fs/fs-writeback.c:2849  \n       f2fs_release_file+0xa8/0x100 fs/f2fs/file.c:1941  \n       __fput+0x23f/0x880 fs/file_table.c:431  \n       task_work_run+0x24f/0x310 kernel/task_work.c:228  \n       resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]  \n       exit_to_user_mode_loop kernel/entry/common.c:114 [inline]  \n       exit_to_user_mode_prepare include/l[...]", "creation_timestamp": "2024-12-29T14:02:26.000000Z"}, {"uuid": "40a4be63-b473-4904-8d25-60c5b55d8457", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-56744", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}]}