Linux kernel -stable discussions
 help / color / mirror / Atom feed
From: Greg KH <gregkh@linuxfoundation.org>
To: "Hao, Qingfeng" <Qingfeng.Hao@windriver.com>
Cc: "cve@kernel.org" <cve@kernel.org>,
	"stable@vger.kernel.org" <stable@vger.kernel.org>,
	"He, Zhe" <Zhe.He@windriver.com>
Subject: Re: [PATCH vulns 0/1] change the sha1 for CVE-2024-26661
Date: Sat, 2 Aug 2025 09:19:30 +0100	[thread overview]
Message-ID: <2025080251-outright-lubricant-1e05@gregkh> (raw)
In-Reply-To: <DS0PR11MB79597F9B511913D0EF4DDA458826A@DS0PR11MB7959.namprd11.prod.outlook.com>

On Fri, Aug 01, 2025 at 12:04:54PM +0000, Hao, Qingfeng wrote:
> Hi Greg,
> Thanks for your check and comments. Sorry that I mistakenly changed 
> the files of .dyad and .json. I'll pay attention next time. 
> The original fix 66951d98d9bf ("drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'") 
> or fb5a3d037082 for CVE-2024-26661 didn't fix the CVE (or even made it worse) because the key change 
> is to check if “tg” is NULL before referencing it, but the fix does NOT do that correctly:
> +       if (!abm && !tg && !panel_cntl) 
> +               return; 
> Here "&&" should have been "||".
> The follow-up commit 17ba9cde11c2 fixes this by:
> -       if (!abm && !tg && !panel_cntl) 
> +       if (!abm || !tg || !panel_cntl) 
>                 return; 
> So we consider that 66951d98d9bf is not a complete fix. It actually made things worse.
> 66951d98d9bf and 17ba9cde11c2 together fix CVE-2024-26661.
> The same problem happened to CVE-2024-26662.
> If you agree with the above analysis, should I append 17ba9cde11c2bfebbd70867b0a2ac4a22e573379 to CVE-2024-26661.sha1 ? 

I think that the original CVE should just be rejected and a new one
added for the other sha1 you have pointed out that actually fixes the
issue because the first one does not do anything.  Is that ok?

thanks,

greg k-h

  reply	other threads:[~2025-08-02  8:19 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-08-01  4:06 [PATCH vulns 0/1] change the sha1 for CVE-2024-26661 Qingfeng Hao
2025-08-01  4:06 ` [PATCH vulns 1/1] CVE-2024-26661: change the sha1 of the cve id Qingfeng Hao
2025-08-01  7:41 ` [PATCH vulns 0/1] change the sha1 for CVE-2024-26661 Greg KH
2025-08-01 12:04   ` Hao, Qingfeng
2025-08-02  8:19     ` Greg KH [this message]
2025-08-04  7:47       ` Qingfeng Hao
2025-08-11 15:31         ` Greg KH

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2025080251-outright-lubricant-1e05@gregkh \
    --to=gregkh@linuxfoundation.org \
    --cc=Qingfeng.Hao@windriver.com \
    --cc=Zhe.He@windriver.com \
    --cc=cve@kernel.org \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox