### [CVE-2024-27042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27042) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.19%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=a0ccc717c4ab3ef572f023fdceffb4b6df496a0d%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'The issue arises when the array 'adev->vcn.vcn_config' is accessedbefore checking if the index 'adev->vcn.num_vcn_inst' is within thebounds of the array.The fix involves moving the bounds check before the array access. Thisensures that 'adev->vcn.num_vcn_inst' is within the bounds of the arraybefore it is used as an index.Fixes the below:drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset 'adev->vcn.num_vcn_inst' after use. ### POC #### Reference No PoCs from references. #### Github - https://github.com/bygregonline/devsec-fastapi-report