{"uuid": "4029d234-d9f2-426c-bba9-4535d4466047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49971", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1940", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49971\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Increase array size of dummy_boolean\n\n[WHY]\ndml2_core_shared_mode_support and dml_core_mode_support access the third\nelement of dummy_boolean, i.e. hw_debug5 = &amp;s-&gt;dummy_boolean[2], when\ndummy_boolean has size of 2. Any assignment to hw_debug5 causes an\nOVERRUN.\n\n[HOW]\nIncrease dummy_boolean's array size to 3.\n\nThis fixes 2 OVERRUN issues reported by Coverity.\n\ud83d\udccf Published: 2024-10-21T18:02:20.344Z\n\ud83d\udccf Modified: 2025-01-16T11:53:24.847Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e9e48b7bb9cf3b78f0305ef0144aaf61da0a83d8\n2. https://git.kernel.org/stable/c/6d64d39486197083497a01b39e23f2f8474b35d3", "creation_timestamp": "2025-01-16T12:55:29.000000Z"}