摘要:
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'
The issue arises when the array 'adev->vcn.vcn_config' is accessed
before checking if the index 'adev->vcn.num_vcn_inst' is within the
bounds of the array.
The fix involves moving the bounds check before the array access. This
ensures that 'adev->vcn.num_vcn_inst' is within the bounds of the array
before it is used as an index.
Fixes the below:
drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset 'adev->vcn.num_vcn_inst' after use.
安全等级: Low
公告ID: KylinSec-SA-2024-2153
发布日期: 2024年5月28日
关联CVE: CVE-2024-27042
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'
The issue arises when the array 'adev->vcn.vcn_config' is accessed
before checking if the index 'adev->vcn.num_vcn_inst' is within the
bounds of the array.
The fix involves moving the bounds check before the array access. This
ensures that 'adev->vcn.num_vcn_inst' is within the bounds of the array
before it is used as an index.
Fixes the below:
drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset 'adev->vcn.num_vcn_inst' after use.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-27042 | KY3.4-4A | kernel | Unaffected |
CVE-2024-27042 | KY3.4-5 | kernel | Unaffected |
CVE-2024-27042 | KY3.5.1 | kernel | Unaffected |
CVE-2024-27042 | KY3.5.3 | kernel | Unaffected |
CVE-2024-27042 | V6 | kernel | Unaffected |