{"uuid": "71a815fe-5fa5-4d76-9017-b8c26f0be337", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56782", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/770", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56782\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration()\n\nacpi_dev_hid_match() does not check for adev == NULL, dereferencing\nit unconditional.\n\nAdd a check for adev being NULL before calling acpi_dev_hid_match().\n\nAt the moment acpi_quirk_skip_serdev_enumeration() is never called with\na controller_parent without an ACPI companion, but better safe than sorry.\n\ud83d\udccf Published: 2025-01-08T17:51:58.768Z\n\ud83d\udccf Modified: 2025-01-08T17:51:58.768Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e173bce05f7032a8b4964cfef82a4b7668f5f3af\n2. https://git.kernel.org/stable/c/4a49194f587a62d972b602e3e1a2c3cfe6567966", "creation_timestamp": "2025-01-08T18:20:19.000000Z"}