{"vulnerability": "CVE-2024-56777", "sightings": [{"uuid": "d1d4e4ab-0d71-43f2-b6bc-e4e760a84963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56777", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113794066463635112", "content": "", "creation_timestamp": "2025-01-08T18:07:37.780852Z"}, {"uuid": "90769b13-6948-48c9-aca6-4b1a9bf45b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56777", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfarh76bq425", "content": "", "creation_timestamp": "2025-01-08T18:15:57.083267Z"}, {"uuid": "a7fd3962-8db1-4c88-b10c-42153e783930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56777", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfatatx4oa2q", "content": "", "creation_timestamp": "2025-01-08T18:48:12.949722Z"}, {"uuid": "3f2e6d15-cc10-4800-a239-b462547b707f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56777", "type": "seen", "source": "https://t.me/cvedetector/14719", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56777 - \"Linux kernel Deref Dereference Error in drm/sti\"\", \n  \"Content\": \"CVE ID : CVE-2024-56777 \nPublished : Jan. 8, 2025, 6:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check  \n  \nThe return value of drm_atomic_get_crtc_state() needs to be  \nchecked. To avoid use of error pointer 'crtc_state' in case  \nof the failure. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T20:00:04.000000Z"}, {"uuid": "2be681cc-a7a6-40b8-baa3-9986a0f6a9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-56777", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "1358dff1-af88-4dcf-95db-6b957038ec31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56777", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/775", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56777\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check\n\nThe return value of drm_atomic_get_crtc_state() needs to be\nchecked. To avoid use of error pointer 'crtc_state' in case\nof the failure.\n\ud83d\udccf Published: 2025-01-08T17:49:15.483Z\n\ud83d\udccf Modified: 2025-01-08T17:49:15.483Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f5804567cf9605d6e5ec46c0bb786f7d50f18c13\n2. https://git.kernel.org/stable/c/b79612ed6bc1a184c45427105c851b5b2d4342ca\n3. https://git.kernel.org/stable/c/997b64c3f4c1827c5cfda8ae7f5d13f78d28b541\n4. https://git.kernel.org/stable/c/3cf2e7c448e246f7e700c7aa47450d1e27579559\n5. https://git.kernel.org/stable/c/e965e771b069421c233d674c3c8cd8c7f7245f42", "creation_timestamp": "2025-01-08T18:21:43.000000Z"}]}