{"uuid": "a81c63ec-277e-49ec-8439-8afb3ea7cebe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50004", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50004\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35\n\n[WHY &amp; HOW]\nMismatch in DCN35 DML2 cause bw validation failed to acquire unexpected DPP pipe to cause\ngrey screen and system hang. Remove EnhancedPrefetchScheduleAccelerationFinal value override\nto match HW spec.\n\n(cherry picked from commit 9dad21f910fcea2bdcff4af46159101d7f9cd8ba)\n\ud83d\udccf Published: 2024-10-21T18:53:58.609Z\n\ud83d\udccf Modified: 2025-01-16T11:53:25.998Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/945dc25eda88b5d6e30c9686dc619ab981c22d0e\n2. https://git.kernel.org/stable/c/4010efc8516899981cc3b57be2d4a2d5d9e50228\n3. https://git.kernel.org/stable/c/0d5e5e8a0aa49ea2163abf128da3b509a6c58286", "creation_timestamp": "2025-01-16T12:55:29.000000Z"}