We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' The issue arises when the array 'adev->vcn.vcn_config' is accessed before checking if the index 'adev->vcn.num_vcn_inst' is within the bounds of the array. The fix involves moving the bounds check before the array access. This ensures that 'adev->vcn.num_vcn_inst' is within the bounds of the array before it is used as an index. Fixes the below: drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset 'adev->vcn.num_vcn_inst' after use.
Reserved 2024-02-19 | Published 2024-05-01 | Updated 2024-11-05 | Assigner Linuxgit.kernel.org/...c/8f3e68c6a3fff53c2240762a47a0045d89371775
git.kernel.org/...c/b33d4af102b9c1f7a83d3f0ad3cab7d2bab8f058
git.kernel.org/...c/8db10cee51e3e11a6658742465edc21986cf1e8d
git.kernel.org/...c/cdb637d339572398821204a1142d8d615668f1e9
Support options