{"vulnerability": "CVE-2024-57887", "sightings": [{"uuid": "07c35803-5012-429e-ab96-d016e7cb57d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57887", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfrtyjnolo2r", "content": "", "creation_timestamp": "2025-01-15T13:16:41.532828Z"}, {"uuid": "a78be379-8be9-4ceb-990b-baf2d54a1c3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57887", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfrvq7fzpz2w", "content": "", "creation_timestamp": "2025-01-15T13:47:52.497975Z"}, {"uuid": "39b71990-b957-465c-8301-a8a7d0474e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-57887", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "eec166c1-a166-421e-bcb1-635e64e1df8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-57887", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "8f4f3b11-16b3-4b61-96ca-3bee25a1b46c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57887", "type": "seen", "source": "https://t.me/cvedetector/15454", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57887 - Linux Kernelony Use-After-Free Vulnerability in Adv7511 DRM\", \n  \"Content\": \"CVE ID : CVE-2024-57887 \nPublished : Jan. 15, 2025, 1:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm: adv7511: Fix use-after-free in adv7533_attach_dsi()  \n  \nThe host_node pointer was assigned and freed in adv7533_parse_dt(), and  \nlater, adv7533_attach_dsi() uses the same. Fix this use-after-free issue  \nby\u00a0dropping of_node_put() in adv7533_parse_dt() and calling of_node_put()  \nin error path of probe() and also in the remove(). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T15:06:58.000000Z"}, {"uuid": "f2a26977-7671-4bda-8b57-369e3d6a2edd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57887", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2121", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57887\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: adv7511: Fix use-after-free in adv7533_attach_dsi()\n\nThe host_node pointer was assigned and freed in adv7533_parse_dt(), and\nlater, adv7533_attach_dsi() uses the same. Fix this use-after-free issue\nby\u00a0dropping of_node_put() in adv7533_parse_dt() and calling of_node_put()\nin error path of probe() and also in the remove().\n\ud83d\udccf Published: 2025-01-15T13:05:39.933Z\n\ud83d\udccf Modified: 2025-01-17T13:27:07.276Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/d208571943ffddc438a7ce533d5d0b9219806242\n2. https://git.kernel.org/stable/c/1f49aaf55652580ae63ab83d67211fe6a55d83dc\n3. https://git.kernel.org/stable/c/ca9d077350fa21897de8bf64cba23b198740aab5\n4. https://git.kernel.org/stable/c/81adbd3ff21c1182e06aa02c6be0bfd9ea02d8e8", "creation_timestamp": "2025-01-17T13:56:43.000000Z"}]}