{"id":"CVE-2024-49895","summary":"drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation\n\nThis commit addresses a potential index out of bounds issue in the\n`cm3_helper_translate_curve_to_degamma_hw_format` function in the DCN30\ncolor  management module. The issue could occur when the index 'i'\nexceeds the  number of transfer function points (TRANSFER_FUNC_POINTS).\n\nThe fix adds a check to ensure 'i' is within bounds before accessing the\ntransfer function points. If 'i' is out of bounds, the function returns\nfalse to indicate an error.\n\nReported by smatch:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:338 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-\u003etf_pts.red' 1025 \u003c= s32max\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:339 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-\u003etf_pts.green' 1025 \u003c= s32max\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:340 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-\u003etf_pts.blue' 1025 \u003c= s32max","modified":"2026-03-20T12:38:09.950940Z","published":"2024-10-21T18:01:29.028Z","related":["MGASA-2024-0344","MGASA-2024-0345","SUSE-SU-2024:3983-1","SUSE-SU-2024:3984-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:4314-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49895.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0d38a0751143afc03faef02d55d31f70374ff843"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ad89f83343a501890cf082c8a584e96b59fe4015"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bc50b614d59990747dd5aeced9ec22f9258991ff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c4fdc2d6fea129684b82bab90bb52fbace494a58"},{"type":"WEB","url":"https://git.kernel.org/stable/c/de6ee4f9e6b1c36b4fdc7c345c1a6de9e246093e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f3ccd855b4395ce65f10dd37847167f52e122b70"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f5c3d306de91a4b69cfe3eedb72b42d452593e42"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49895.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49895"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c"},{"fixed":"ad89f83343a501890cf082c8a584e96b59fe4015"},{"fixed":"de6ee4f9e6b1c36b4fdc7c345c1a6de9e246093e"},{"fixed":"f3ccd855b4395ce65f10dd37847167f52e122b70"},{"fixed":"0d38a0751143afc03faef02d55d31f70374ff843"},{"fixed":"f5c3d306de91a4b69cfe3eedb72b42d452593e42"},{"fixed":"c4fdc2d6fea129684b82bab90bb52fbace494a58"},{"fixed":"bc50b614d59990747dd5aeced9ec22f9258991ff"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49895.json"}}],"schema_version":"1.7.5"}