From: Greg KH <gregkh@linuxfoundation.org>
To: "Hao, Qingfeng" <Qingfeng.Hao@windriver.com>
Cc: "cve@kernel.org" <cve@kernel.org>,
"stable@vger.kernel.org" <stable@vger.kernel.org>,
"He, Zhe" <Zhe.He@windriver.com>
Subject: Re: [PATCH vulns 0/1] change the sha1 for CVE-2024-26661
Date: Sat, 2 Aug 2025 09:19:30 +0100 [thread overview]
Message-ID: <2025080251-outright-lubricant-1e05@gregkh> (raw)
In-Reply-To: <DS0PR11MB79597F9B511913D0EF4DDA458826A@DS0PR11MB7959.namprd11.prod.outlook.com>
On Fri, Aug 01, 2025 at 12:04:54PM +0000, Hao, Qingfeng wrote:
> Hi Greg,
> Thanks for your check and comments. Sorry that I mistakenly changed
> the files of .dyad and .json. I'll pay attention next time.
> The original fix 66951d98d9bf ("drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'")
> or fb5a3d037082 for CVE-2024-26661 didn't fix the CVE (or even made it worse) because the key change
> is to check if “tg” is NULL before referencing it, but the fix does NOT do that correctly:
> + if (!abm && !tg && !panel_cntl)
> + return;
> Here "&&" should have been "||".
> The follow-up commit 17ba9cde11c2 fixes this by:
> - if (!abm && !tg && !panel_cntl)
> + if (!abm || !tg || !panel_cntl)
> return;
> So we consider that 66951d98d9bf is not a complete fix. It actually made things worse.
> 66951d98d9bf and 17ba9cde11c2 together fix CVE-2024-26661.
> The same problem happened to CVE-2024-26662.
> If you agree with the above analysis, should I append 17ba9cde11c2bfebbd70867b0a2ac4a22e573379 to CVE-2024-26661.sha1 ?
I think that the original CVE should just be rejected and a new one
added for the other sha1 you have pointed out that actually fixes the
issue because the first one does not do anything. Is that ok?
thanks,
greg k-h
next prev parent reply other threads:[~2025-08-02 8:19 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-08-01 4:06 [PATCH vulns 0/1] change the sha1 for CVE-2024-26661 Qingfeng Hao
2025-08-01 4:06 ` [PATCH vulns 1/1] CVE-2024-26661: change the sha1 of the cve id Qingfeng Hao
2025-08-01 7:41 ` [PATCH vulns 0/1] change the sha1 for CVE-2024-26661 Greg KH
2025-08-01 12:04 ` Hao, Qingfeng
2025-08-02 8:19 ` Greg KH [this message]
2025-08-04 7:47 ` Qingfeng Hao
2025-08-11 15:31 ` Greg KH
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2025080251-outright-lubricant-1e05@gregkh \
--to=gregkh@linuxfoundation.org \
--cc=Qingfeng.Hao@windriver.com \
--cc=Zhe.He@windriver.com \
--cc=cve@kernel.org \
--cc=stable@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox