First published: Wed May 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' The issue arises when the array 'adev->vcn.vcn_config' is accessed before checking if the index 'adev->vcn.num_vcn_inst' is within the bounds of the array. The fix involves moving the bounds check before the array access. This ensures that 'adev->vcn.num_vcn_inst' is within the bounds of the array before it is used as an index. Fixes the below: drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset 'adev->vcn.num_vcn_inst' after use.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.6.23 | 6.6.23 |
redhat/kernel | <6.7.11 | 6.7.11 |
redhat/kernel | <6.8.2 | 6.8.2 |
redhat/kernel | <6.9 | 6.9 |
Linux Kernel | >=5.19<6.6.23 | |
Linux Kernel | >=6.7<6.7.11 | |
Linux Kernel | >=6.8<6.8.2 | |
debian/linux | <=6.1.123-1<=6.1.119-1 | 5.10.223-1 5.10.226-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27042 has a medium severity level due to the potential for out-of-bounds access.
To fix CVE-2024-27042, update your Linux kernel to versions 6.6.23, 6.7.11, 6.8.2, or 6.9.
CVE-2024-27042 affects multiple versions of the Linux kernel below 6.6.23 and between 6.7 and 6.9.
Yes, patches are available in the form of updated kernel versions from Red Hat and Debian.
Yes, the out-of-bounds access vulnerability in CVE-2024-27042 could potentially lead to system instability or crashes.