๐Ÿ” CVE Alert

CVE-2024-49969

UNKNOWN 0.0

drm/amd/display: Fix index out of bounds in DCN30 color transformation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index out of bounds in DCN30 color transformation This commit addresses a potential index out of bounds issue in the `cm3_helper_translate_curve_to_hw_format` function in the DCN30 color management module. The issue could occur when the index 'i' exceeds the number of transfer function points (TRANSFER_FUNC_POINTS). The fix adds a check to ensure 'i' is within bounds before accessing the transfer function points. If 'i' is out of bounds, the function returns false to indicate an error. drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:180 cm3_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf->tf_pts.red' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:181 cm3_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf->tf_pts.green' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:182 cm3_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf->tf_pts.blue' 1025 <= s32max

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
03f54d7d3448dc1668568d1adb69b43c1d1dc79f < 7ab69af56a23859b647dee69fa1052c689343621 03f54d7d3448dc1668568d1adb69b43c1d1dc79f < c13f9c62015c56a938304cef6d507227ea3e0039 03f54d7d3448dc1668568d1adb69b43c1d1dc79f < 0f1e222a4b41d77c442901d166fbdca967af0d86 03f54d7d3448dc1668568d1adb69b43c1d1dc79f < 929506d5671419cffd8d01e9a7f5eae53682a838 03f54d7d3448dc1668568d1adb69b43c1d1dc79f < 578422ddae3d13362b64e77ef9bab98780641631 03f54d7d3448dc1668568d1adb69b43c1d1dc79f < b9d8b94ec7e67f0cae228c054f77b73967c389a3 03f54d7d3448dc1668568d1adb69b43c1d1dc79f < d81873f9e715b72d4f8d391c8eb243946f784dfc
Linux / Linux
5.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7ab69af56a23859b647dee69fa1052c689343621 git.kernel.org: https://git.kernel.org/stable/c/c13f9c62015c56a938304cef6d507227ea3e0039 git.kernel.org: https://git.kernel.org/stable/c/0f1e222a4b41d77c442901d166fbdca967af0d86 git.kernel.org: https://git.kernel.org/stable/c/929506d5671419cffd8d01e9a7f5eae53682a838 git.kernel.org: https://git.kernel.org/stable/c/578422ddae3d13362b64e77ef9bab98780641631 git.kernel.org: https://git.kernel.org/stable/c/b9d8b94ec7e67f0cae228c054f77b73967c389a3 git.kernel.org: https://git.kernel.org/stable/c/d81873f9e715b72d4f8d391c8eb243946f784dfc lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html