public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Re: CVE-2024-42308: drm/amd/display: Check for NULL pointer
       [not found] <2024081751-CVE-2024-42308-562d@gregkh>
@ 2024-10-07 11:01 ` Siddh Raman Pant
  2024-10-09 13:56   ` gregkh
  0 siblings, 1 reply; 2+ messages in thread
From: Siddh Raman Pant @ 2024-10-07 11:01 UTC (permalink / raw)
  To: gregkh@linuxfoundation.org; +Cc: cve@kernel.org, linux-kernel@vger.kernel.org

[-- Attachment #1: Type: text/plain, Size: 956 bytes --]

On Sat, 17 Aug 2024 11:10:13 +0200, Greg Kroah-Hartman wrote:
> In the Linux kernel, the following vulnerability has been resolved:
> 
> drm/amd/display: Check for NULL pointer
> 
> [why & how]
> Need to make sure plane_state is initialized
> before accessing its members.
> 
> (cherry picked from commit 295d91cbc700651782a60572f83c24861607b648)
> 
> The Linux kernel CVE team has assigned CVE-2024-42308 to this issue.

This commit is no-op / doesn't make any difference, as there is an
implicit NULL check rigth above it, as plane_state cannot be NULL
(checked at the start of function).

So this CVE should be invalid.

> Affected and fixed versions
> ===========================
> 
> 	Fixed in 6.1.103 with commit f068494430d1
> 	Fixed in 6.6.44 with commit 4ccd37085976
> 	Fixed in 6.10.3 with commit 185616085b12
> 	Fixed in 6.11-rc1 with commit 4ab68e168ae1

This also got backported to older kernels.

Thanks,
Siddh

[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: CVE-2024-42308: drm/amd/display: Check for NULL pointer
  2024-10-07 11:01 ` CVE-2024-42308: drm/amd/display: Check for NULL pointer Siddh Raman Pant
@ 2024-10-09 13:56   ` gregkh
  0 siblings, 0 replies; 2+ messages in thread
From: gregkh @ 2024-10-09 13:56 UTC (permalink / raw)
  To: Siddh Raman Pant; +Cc: cve@kernel.org, linux-kernel@vger.kernel.org

On Mon, Oct 07, 2024 at 11:01:59AM +0000, Siddh Raman Pant wrote:
> On Sat, 17 Aug 2024 11:10:13 +0200, Greg Kroah-Hartman wrote:
> > In the Linux kernel, the following vulnerability has been resolved:
> > 
> > drm/amd/display: Check for NULL pointer
> > 
> > [why & how]
> > Need to make sure plane_state is initialized
> > before accessing its members.
> > 
> > (cherry picked from commit 295d91cbc700651782a60572f83c24861607b648)
> > 
> > The Linux kernel CVE team has assigned CVE-2024-42308 to this issue.
> 
> This commit is no-op / doesn't make any difference, as there is an
> implicit NULL check rigth above it, as plane_state cannot be NULL
> (checked at the start of function).
> 
> So this CVE should be invalid.

Yeah, tricky code, I see why the static tools got this wrong.  I'll go
invalidate this now, thanks for the report!

greg k-h

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2024-10-09 13:56 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <2024081751-CVE-2024-42308-562d@gregkh>
2024-10-07 11:01 ` CVE-2024-42308: drm/amd/display: Check for NULL pointer Siddh Raman Pant
2024-10-09 13:56   ` gregkh

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox