Received: by 2002:ab2:7855:0:b0:1f9:5764:f03e with SMTP id m21csp109783lqp; Tue, 21 May 2024 21:10:28 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCV3Y7s2xDpWqXDther2jHRtoAcljZztYiLMEjWppFJriSOOuDqHkrM0fskcVpnSRqCLU+odB6X/yTAr5PTY6YngkKIjIy+8weC8dZrzgA== X-Google-Smtp-Source: AGHT+IHLK/skGqE8lZRBRvrTVzE7LdQHFv7xfxP6A5/OdJbbWXsbppCnnnh3qouOgqv9JMplqpmJ X-Received: by 2002:a05:6358:e4a6:b0:17e:a9b7:2636 with SMTP id e5c5f4694b2df-197921320c3mr84725455d.22.1716351028539; Tue, 21 May 2024 21:10:28 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716351028; cv=pass; d=google.com; s=arc-20160816; b=sRtZLabtvTzhk0S3qx7laU8G9mlIQRJUDu5ms8TZhoApN60l61wVwAUhjxqWVKZGo9 H2jdH0rnPtP2KwGDfBMr33ssSPwJPzg3wwPAKKtqmowAtmPpC/4o8RjCmoAEX/u59zmf FBOeKrzC8NigCIaUwXlnjstzyZ7pFyusD1d217AGOyoqqN2D6UIopcS2jZYnieM2Fg4P jZW6oHx2wf8KQe4cXMaThJgWHP2yazPZfiatqMbZtCJwE9hicrF8EBTipaV+ob8wuaRh URbBjHoit0Pa5cmMcLiVFgNGxYlsK7LTlttu36ub5Cu/WKzIx+EB8ojY9ua20RbYBWqp o66w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=e4g4fJwT11Q4GP9bAHt53Am/NDmq0MCRRf4uY+n13aA=; fh=yiPNPFTj8L/3uGtK6EGjq2oAUaNtwq6qjgajLlnBHGA=; b=YpsT+KN1EupdoTDzrgbbxjPFoFmbrNzdBMz/fbAou4eCmWYNQrkY6M4eckff3kyQbG fCvDg3qNAe4xaeckrv2uZIgHQPTtqR7El2+9FE0m3f5Ua/iWyn/z8TLdez318AbPN1jI fMsgvO/AhRURIcOdRiHEEWrGUV+JywbfrZH+J0eTOlkUaPdM9Pk42y7rTazftA+y5ZJR wkZKE697iR6KtIzSvv32UZW332tczOnfnNoqi6ccbnjoldjq/PJM4jazmpP3BmLNZnrE CfwDkgyBeOKgZTUghH1MXKzSxZ1tsl9LOAoe5smM/W7JNEIeuQ2F9unZUcFHr6P3Bmrp aWvw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=PNEXbRle; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-185755-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-185755-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id 41be03b00d2f7-6341180dccasi2917823a12.468.2024.05.21.21.10.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 May 2024 21:10:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-185755-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=PNEXbRle; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-185755-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-185755-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id AC72AB21499 for ; Wed, 22 May 2024 04:10:21 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DF27F71B48; Wed, 22 May 2024 04:10:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="PNEXbRle" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0FE7529CA; Wed, 22 May 2024 04:10:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716351012; cv=none; b=tn5CHwltDchdwNhmaj73VTL6V9p8uHr7bzA6s6/Dvl2sFEOlsRouRCd9K0xO3Ttp18i20GFHxUZRgDeQNtM+CnbttAO7DJ+o4oA0xXHNlp0eHWIjw3CG0ADA4KXE7RWLZZCoVVxNh3jqtThme61CbcwCM6wXARuyq4l3GVFSop0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716351012; c=relaxed/simple; bh=cJhYFMnB5TSGX6JKW79V6GTSgqLPCROk9zU1RYmQlwM=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=J8kTQEsQp1cF89hhtg5DFDrDBX/mXMqv6b9VFAeFq5WbOvpU//YCOK7wY83oizfE9XzrW2x8k87xnLktoL0qF1QTH6H+/2YRYboEKy2NIYU3TJoC5cbGbEAfAGs2gUrw6uQou3bAwEB8vw7uVUfEyTEIny0g3cmgJAG82glKpRI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=PNEXbRle; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id EE612C2BD11; Wed, 22 May 2024 04:10:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1716351011; bh=cJhYFMnB5TSGX6JKW79V6GTSgqLPCROk9zU1RYmQlwM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=PNEXbRle4Uj35lOXLaPnRFCFVPgImUiQFDGpM40gcXe65Y7QUZIVkw3k7iQntWppc uuFn1vmB3KL+ePWc2CGk758NQEg06u0zQf3IoUuAFP439M0FAVTE7v6nnSBSX6tDbU ugzYxVb4/JOFozzCL8ltCkr8q2/VTwFKr2m0695s= Date: Wed, 22 May 2024 06:10:09 +0200 From: Greg KH To: Michal Hocko Cc: cve@kernel.org, linux-kernel@vger.kernel.org, linux-cve-announce@vger.kernel.org, Lee Jones Subject: Re: CVE-2024-26650: platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe Message-ID: <2024052216-detest-whiff-15e3@gregkh> References: <20240326175007.1388794-18-lee@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Tue, May 21, 2024 at 09:31:54PM +0200, Michal Hocko wrote: > This patch has been reverted in upstream by 03c6284df179 ("Revert > "drm/amd/amdgpu: Fix potential ioremap() memory leaks in > amdgpu_device_init()"") and based on the changelog the CVE should be > rejected. Ok, the original commit here happened in these releases: 6.1.76 6.6.15 6.7.3 6.8 while the revert is only in these releases: 6.1.86 6.6.27 6.8.6 6.9 but there are also commits in these releases that reference the original commit and also say they fix it: 6.1.84 6.6.23 6.7.11 i.e. commit aec7d25b497c ("platform/x86: p2sb: On Goldmont only cache P2SB and SPI devfn BAR") so that commit is also needed in order to make this commit work properly, in other words, the original isn't totally invalid on it's own. So the revert is a fix for the original patch, and needs to keep being a CVE, but you think that the original should not be because it was reverted, right? That kind of makes sense, but at the time, the original was a valid CVE, so we were correct to assign that, what do we do about the "middle" one here, ignore it? Without both of them, you might have a problem still but I guess that's up to the systems that cherry-pick to work out, right? Should we be searching the database for assigned CVEs to the commits that new ones are marked as "Fixes:" for and think about how to revoke those original ones at the same time? thanks, greg k-h