Lucene search

K
cve416baaa9-dc9f-4396-8d5f-8c081fb06d67CVE-2024-27042
HistoryMay 01, 2024 - 1:15 p.m.

CVE-2024-27042

2024-05-0113:15:49
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
43
linux kernel
out-of-bounds access vulnerability
amdgpu.

7.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.1%

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix potential out-of-bounds access in ‘amdgpu_discovery_reg_base_init()’

The issue arises when the array ‘adev->vcn.vcn_config’ is accessed
before checking if the index ‘adev->vcn.num_vcn_inst’ is within the
bounds of the array.

The fix involves moving the bounds check before the array access. This
ensures that ‘adev->vcn.num_vcn_inst’ is within the bounds of the array
before it is used as an index.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset ‘adev->vcn.num_vcn_inst’ after use.

VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

7.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.1%