{"vulnerability": "CVE-2024-53239", "sightings": [{"uuid": "1f5d5b29-5997-46b8-bd8f-13eaf2064a69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53239", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113725200476661070", "content": "", "creation_timestamp": "2024-12-27T14:14:05.613342Z"}, {"uuid": "e56ef226-4432-4f20-93ae-ec6bba63bf00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53239", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6m55od422", "content": "", "creation_timestamp": "2024-12-27T14:18:49.476660Z"}, {"uuid": "61c4c97f-d435-4d9f-9b22-625679187cc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53239", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113726176402702004", "content": "", "creation_timestamp": "2024-12-27T18:22:17.226757Z"}, {"uuid": "01594e6d-e371-41d6-a071-689f5142bc6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53239", "type": "seen", "source": "https://t.me/cvedetector/13759", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53239 - \"ALSA 6fire Use-After-Free Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-53239 \nPublished : Dec. 27, 2024, 2:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nALSA: 6fire: Release resources at card release  \n  \nThe current 6fire code tries to release the resources right after the  \ncall of usb6fire_chip_abort().  But at this moment, the card object  \nmight be still in use (as we're calling snd_card_free_when_closed()).  \n  \nFor avoid potential UAFs, move the release of resources to the card's  \nprivate_free instead of the manual call of usb6fire_chip_destroy() at  \nthe USB disconnect callback. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T16:00:42.000000Z"}, {"uuid": "9a70f0c0-45dd-43f7-a904-0728f1c663d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53239", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}]}