{"vulnerability": "CVE-2024-56775", "sightings": [{"uuid": "15389e90-0e0c-4221-a969-4fdc5f0eefe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56775", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113794066434882319", "content": "", "creation_timestamp": "2025-01-08T18:07:36.800102Z"}, {"uuid": "68fc0545-66b6-44c6-8b50-23fccace8779", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56775", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfarh2lndf2k", "content": "", "creation_timestamp": "2025-01-08T18:15:52.159437Z"}, {"uuid": "dbe26312-6412-400d-9103-e79619c6dd29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56775", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfatatogm32k", "content": "", "creation_timestamp": "2025-01-08T18:48:11.677600Z"}, {"uuid": "641d6d75-b87a-40ac-ac75-73bea93d5b5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56775", "type": "seen", "source": "https://t.me/cvedetector/14712", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56775 - AMD Display Refcount Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56775 \nPublished : Jan. 8, 2025, 6:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/amd/display: Fix handling of plane refcount  \n  \n[Why]  \nThe mechanism to backup and restore plane states doesn't maintain  \nrefcount, which can cause issues if the refcount of the plane changes  \nin between backup and restore operations, such as memory leaks if the  \nrefcount was supposed to go down, or double frees / invalid memory  \naccesses if the refcount was supposed to go up.  \n  \n[How]  \nCache and re-apply current refcount when restoring plane states. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T19:59:55.000000Z"}, {"uuid": "8ad9b20f-7a06-4d7d-b401-1db7c4479fb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56775", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/777", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56775\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix handling of plane refcount\n\n[Why]\nThe mechanism to backup and restore plane states doesn't maintain\nrefcount, which can cause issues if the refcount of the plane changes\nin between backup and restore operations, such as memory leaks if the\nrefcount was supposed to go down, or double frees / invalid memory\naccesses if the refcount was supposed to go up.\n\n[How]\nCache and re-apply current refcount when restoring plane states.\n\ud83d\udccf Published: 2025-01-08T17:49:13.907Z\n\ud83d\udccf Modified: 2025-01-08T17:49:13.907Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/8cb2f6793845f135b28361ba8e96901cae3e5790\n2. https://git.kernel.org/stable/c/27227a234c1487cb7a684615f0749c455218833a", "creation_timestamp": "2025-01-08T18:22:14.000000Z"}, {"uuid": "b8b1cbdd-6993-4c31-9805-0d9916044b44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-56775", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}]}