{"uuid": "bfdc8c4f-a107-48fe-831f-ad660efabd30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42227", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1944", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42227\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix overlapping copy within dml_core_mode_programming\n\n[WHY]\n&amp;mode_lib-&gt;mp.Watermark and &amp;locals-&gt;Watermark are\nthe same address. memcpy may lead to unexpected behavior.\n\n[HOW]\nmemmove should be used.\n\ud83d\udccf Published: 2024-07-30T07:47:08.132Z\n\ud83d\udccf Modified: 2025-01-16T11:53:15.158Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/9342da15f2491d8600eca89c8e0da08876fb969b\n2. https://git.kernel.org/stable/c/f1fd8a0a54e6d23a6d16ee29159f247862460fd1", "creation_timestamp": "2025-01-16T12:55:36.000000Z"}