{"uuid": "1358dff1-af88-4dcf-95db-6b957038ec31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56777", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/775", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56777\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check\n\nThe return value of drm_atomic_get_crtc_state() needs to be\nchecked. To avoid use of error pointer 'crtc_state' in case\nof the failure.\n\ud83d\udccf Published: 2025-01-08T17:49:15.483Z\n\ud83d\udccf Modified: 2025-01-08T17:49:15.483Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f5804567cf9605d6e5ec46c0bb786f7d50f18c13\n2. https://git.kernel.org/stable/c/b79612ed6bc1a184c45427105c851b5b2d4342ca\n3. https://git.kernel.org/stable/c/997b64c3f4c1827c5cfda8ae7f5d13f78d28b541\n4. https://git.kernel.org/stable/c/3cf2e7c448e246f7e700c7aa47450d1e27579559\n5. https://git.kernel.org/stable/c/e965e771b069421c233d674c3c8cd8c7f7245f42", "creation_timestamp": "2025-01-08T18:21:43.000000Z"}