CVE-2024-49894
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-49894 addresses a buffer overflow vulnerability in the Linux kernel's AMD display driver, specifically in the cm_helper_translate_curve_to_degamma_hw_format function. The vulnerability was discovered by the smatch static analysis tool and reported on July 20, 2024. The issue affects multiple versions of the Linux kernel, including versions up to 5.10.227, 5.11 to 5.15.168, 5.16 to 6.1.113, 6.2 to 6.6.55, and 6.7 and later versions (NVD).

Technical details

The vulnerability occurs when the index 'i' exceeds the number of transfer function points (TRANSFERFUNCPOINTS) in the cm_helper_translate_curve_to_degamma_hw_format function, potentially leading to buffer overflow conditions in the red, green, and blue color channels. The issue was identified in the file drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10cmcommon.c at lines 594-596. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The buffer overflow vulnerability could potentially lead to memory corruption, allowing an attacker with local access to achieve high impacts on confidentiality, integrity, and availability of the affected system. The vulnerability affects the color management functionality in AMD's display driver, which could potentially be exploited to cause system instability or execute arbitrary code (NVD).

Mitigation and workarounds

A fix has been implemented that adds a bounds check to ensure the index 'i' does not exceed TRANSFERFUNCPOINTS before accessing the transfer function points. If the index is out of bounds, the function now returns false to indicate an error. The fix has been merged into the Linux kernel and is available through various distribution updates (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40205HIGH7.8
  • Linux KernelLinux Kernel
  • linux-gcp-5.4
NoYesNov 12, 2025
CVE-2025-40211HIGH7.1
  • Linux KernelLinux Kernel
  • linux-gcp-6.8
NoYesNov 21, 2025
CVE-2025-40206MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules-extra
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-modules
NoYesNov 21, 2025
CVE-2025-40212N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management