๐Ÿ” CVE Alert

CVE-2024-49895

UNKNOWN 0.0

drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation This commit addresses a potential index out of bounds issue in the `cm3_helper_translate_curve_to_degamma_hw_format` function in the DCN30 color management module. The issue could occur when the index 'i' exceeds the number of transfer function points (TRANSFER_FUNC_POINTS). The fix adds a check to ensure 'i' is within bounds before accessing the transfer function points. If 'i' is out of bounds, the function returns false to indicate an error. Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:338 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.red' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:339 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.green' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:340 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.blue' 1025 <= s32max

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < ad89f83343a501890cf082c8a584e96b59fe4015 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < de6ee4f9e6b1c36b4fdc7c345c1a6de9e246093e 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < f3ccd855b4395ce65f10dd37847167f52e122b70 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 0d38a0751143afc03faef02d55d31f70374ff843 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < f5c3d306de91a4b69cfe3eedb72b42d452593e42 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < c4fdc2d6fea129684b82bab90bb52fbace494a58 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < bc50b614d59990747dd5aeced9ec22f9258991ff
Linux / Linux
4.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ad89f83343a501890cf082c8a584e96b59fe4015 git.kernel.org: https://git.kernel.org/stable/c/de6ee4f9e6b1c36b4fdc7c345c1a6de9e246093e git.kernel.org: https://git.kernel.org/stable/c/f3ccd855b4395ce65f10dd37847167f52e122b70 git.kernel.org: https://git.kernel.org/stable/c/0d38a0751143afc03faef02d55d31f70374ff843 git.kernel.org: https://git.kernel.org/stable/c/f5c3d306de91a4b69cfe3eedb72b42d452593e42 git.kernel.org: https://git.kernel.org/stable/c/c4fdc2d6fea129684b82bab90bb52fbace494a58 git.kernel.org: https://git.kernel.org/stable/c/bc50b614d59990747dd5aeced9ec22f9258991ff lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html