{"uuid": "f2a26977-7671-4bda-8b57-369e3d6a2edd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57887", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2121", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57887\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: adv7511: Fix use-after-free in adv7533_attach_dsi()\n\nThe host_node pointer was assigned and freed in adv7533_parse_dt(), and\nlater, adv7533_attach_dsi() uses the same. Fix this use-after-free issue\nby\u00a0dropping of_node_put() in adv7533_parse_dt() and calling of_node_put()\nin error path of probe() and also in the remove().\n\ud83d\udccf Published: 2025-01-15T13:05:39.933Z\n\ud83d\udccf Modified: 2025-01-17T13:27:07.276Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/d208571943ffddc438a7ce533d5d0b9219806242\n2. https://git.kernel.org/stable/c/1f49aaf55652580ae63ab83d67211fe6a55d83dc\n3. https://git.kernel.org/stable/c/ca9d077350fa21897de8bf64cba23b198740aab5\n4. https://git.kernel.org/stable/c/81adbd3ff21c1182e06aa02c6be0bfd9ea02d8e8", "creation_timestamp": "2025-01-17T13:56:43.000000Z"}