From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Issue Description: Fixed a potential out-of-bounds issue in the DCN30 degamma hardware format conversion within the function. - Root Cause: An out-of-bounds access may occur when the index exceeds the number of transfer function points (TRANSFER_FUNC_POINTS). - Fix: Added a check to ensure remains within the valid range of transfer function points. If is out of bounds, the function now returns to indicate an error. 2. Reporting Information: - Reporter: smatch - Error Messages Reported: 3. Author and Reviewers: - Author: Srinivasan Shanmugam - Reviewers: Tom Chung, Rodrigo Siqueira, Roman Li, Alex Hung, Harry Wentland, Hamza Mahfooz, Sasha Levin 4. Code Changes: - File: - Changes: - In the function, a check was added to ensure that stays within the valid range of transfer function points. This information indicates that the vulnerability addressed a buffer overflow issue in the DCN30 degamma hardware format conversion, caused by an out-of-bounds index. The fix involves adding a boundary check to ensure the index remains within the valid range, thereby preventing potential errors.