VYPR
High severity7.8NVD Advisory· Published Oct 21, 2024· Updated May 12, 2026

CVE-2024-49894

CVE-2024-49894

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix index out of bounds in degamma hardware format translation

Fixes index out of bounds issue in cm_helper_translate_curve_to_degamma_hw_format function. The issue could occur when the index 'i' exceeds the number of transfer function points (TRANSFER_FUNC_POINTS).

The fix adds a check to ensure 'i' is within bounds before accessing the transfer function points. If 'i' is out of bounds the function returns false to indicate an error.

Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.red' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.green' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.blue' 1025 <= s32max

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A buffer overflow in the Linux kernel's AMD GPU display driver, specifically in degamma curve translation, could allow local privilege escalation.

Vulnerability

Overview

CVE-2024-49894 is a buffer overflow vulnerability in the Linux kernel's AMD GPU display driver. The bug resides in the cm_helper_translate_curve_to_degamma_hw_format function within drivers/gpu/drm/amd/display/dc/dcn10/dcn10_cm_common.c. An index i can exceed the number of transfer function points (TRANSFER_FUNC_POINTS), causing an out-of-bounds write to the output_tf->tf_pts arrays (red, green, blue) which are each sized for 1025 entries [1][3][4].

Exploitation and

Attack Surface

To trigger the vulnerability, an attacker must have local access to the system and the ability to interact with the AMD GPU display subsystem, for instance via Direct Rendering Manager (DRM) ioctls or by loading custom color profiles that trigger the degamma hardware format translation. No authentication beyond local user access is required, as the flaw is in kernel code reachable from user space through standard graphics interfaces.

Impact

A successful exploit allows an attacker to write controlled data beyond the bounds of the tf_pts arrays, potentially corrupting adjacent kernel memory. This can lead to a denial of service (system crash) or, if carefully manipulated, privilege escalation to gain root-level control, as the corruption occurs in kernel memory [1][2].

Mitigation

Status

The Linux kernel upstream has addressed this bug by adding a bounds check before accessing the transfer function points; if the index is out of range, the function returns false. Patched versions are available in the stable kernel update streams [3][4]. Users should update their kernels to the latest fixed versions. Siemens has also confirmed that certain industrial products using the Linux kernel (e.g., SIMATIC S7-1500 TM MFP) are affected and recommends applying available updates [1][2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

113

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

13

News mentions

0

No linked articles in our index yet.