๐Ÿ” CVE Alert

CVE-2024-49894

UNKNOWN 0.0

drm/amd/display: Fix index out of bounds in degamma hardware format translation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index out of bounds in degamma hardware format translation Fixes index out of bounds issue in `cm_helper_translate_curve_to_degamma_hw_format` function. The issue could occur when the index 'i' exceeds the number of transfer function points (TRANSFER_FUNC_POINTS). The fix adds a check to ensure 'i' is within bounds before accessing the transfer function points. If 'i' is out of bounds the function returns false to indicate an error. Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.red' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.green' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.blue' 1025 <= s32max

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < b3dfa878257a7e98830b3009ca5831a01d8f85fc 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < f5f6d90087131812c1e4b9d3103f400f1624396d 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < c130a3c09e3746c1a09ce26c20d21d449d039b1d 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < c6979719012a90e5b8e3bc31725fbfdd0b9b2b79 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 2495c8e272d84685403506833a664fad932e453a 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 122e3a7a8c7bcbe3aacddd6103f67f9f36bed473 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 2f5da549535be8ccd2ab7c9abac8562ad370b181 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 07078fa5d589a7fbce8f81ea8acf7aa0021ab38e 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < b7e99058eb2e86aabd7a10761e76cae33d22b49f
Linux / Linux
4.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b3dfa878257a7e98830b3009ca5831a01d8f85fc git.kernel.org: https://git.kernel.org/stable/c/f5f6d90087131812c1e4b9d3103f400f1624396d git.kernel.org: https://git.kernel.org/stable/c/c130a3c09e3746c1a09ce26c20d21d449d039b1d git.kernel.org: https://git.kernel.org/stable/c/c6979719012a90e5b8e3bc31725fbfdd0b9b2b79 git.kernel.org: https://git.kernel.org/stable/c/2495c8e272d84685403506833a664fad932e453a git.kernel.org: https://git.kernel.org/stable/c/122e3a7a8c7bcbe3aacddd6103f67f9f36bed473 git.kernel.org: https://git.kernel.org/stable/c/2f5da549535be8ccd2ab7c9abac8562ad370b181 git.kernel.org: https://git.kernel.org/stable/c/07078fa5d589a7fbce8f81ea8acf7aa0021ab38e git.kernel.org: https://git.kernel.org/stable/c/b7e99058eb2e86aabd7a10761e76cae33d22b49f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html