Received: by 2002:ab2:68c1:0:b0:1fd:9a81:d0e4 with SMTP id e1csp18526lqp; Sat, 8 Jun 2024 04:37:58 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUoWEMz27RKWXwbCkVEe/v+/9vBhbODnpS4aYzCkm2Wflihp1bGCQwO3Ka/GXIG88rvr32v4V2Rtf9cyT797xlKIHLAKoxoWCHpIQ9bow== X-Google-Smtp-Source: AGHT+IEtjwe4men0+qBHejokeIFiS0Bn2mHK9MXk/3BfajtCNuqvO6TvFdo6PawoA9MLDVmyyBRw X-Received: by 2002:a05:6602:6c15:b0:7eb:78b4:faee with SMTP id ca18e2360f4ac-7eb78b4fbfdmr26279939f.3.1717846678429; Sat, 08 Jun 2024 04:37:58 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1717846678; cv=pass; d=google.com; s=arc-20160816; b=rLdHGvueFHqyzNBaHFawTkXtzmTaYUPp+HaFQ/Pa5Zvjtrtxb3AiJWUpQU+IhN9ozK bTgxLr+7v1jV2ZLpyuSDFgTXZqcx2xui/toZPx0TqcVKZm4NPU96RtoJACQ999dhRmwS X7SjUh9Y2ngl/GKpLHavYTfxqxFujrP57nhlsuw2FI2KGrKaHfLbf7qNdGxrETDWqmw6 aBz3kGEkDp03NMpmUuTK32wNpU2nRgpAEL6U0P24N6oOjk/TiTJ5aX8b/0xNk2obZ94v ePpSYxKUYAHPgWhSO6aIcpYpqeIJnDc7+wUxsJdweNsRhofey24DZv4EUuMocT2xmEr6 MKNg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=E0yx09Su1qYA4dR46ZEJnemWMPjxp0wMjUPb19CDbUo=; fh=9pg4Xar+ulR0Ro8wXHgApnotBkyus97apcDbThLiMpY=; b=elZmIgsk17fGOUTduqF5fc/BOluoRfIFuZTIG5lG5soGXQoEBaSW6vGlFRAISPWQ6p H6w2nR+Q944bHit5xSwzi+VMNoWcmWvAEwP+CzYUYzhqzv3xoKuxAREjMbn3k0DsW4xy AUKTwdXSRjV+eo9yMbMjK454EyGT6D+Z/uU2qGySig6riZpYTcOCaky4Afnioev2R/XV WUqj2B3XqEInv+85awteVYpX1I8QvnzODbkXD9Bq/IcUW/WA2HJd3466QFUljlIa7Rq0 Q+b3xfemJwhatsqAosku3axuDy8y/fWvowdUijAYVVqJusAaVMR56Q8FHsNR45F6ddkL 9k8A==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=o3fX9huc; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-207018-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-207018-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id d2e1a72fcca58-7042399beedsi829160b3a.153.2024.06.08.04.37.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 08 Jun 2024 04:37:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-207018-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=o3fX9huc; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-207018-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-207018-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 07102282A84 for ; Sat, 8 Jun 2024 11:37:58 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 3DBB317837F; Sat, 8 Jun 2024 11:37:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="o3fX9huc" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 463774C65; Sat, 8 Jun 2024 11:37:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717846671; cv=none; b=LEuRHQOQcoKn/Edh0F1sVOyp9+4WB2rwUt+ojmiWI7NlsFsg+FblNFg4nGWeZ3ltntOKJioZHFH9s8YUxKIiEItto/9+OnsVzuVP5ZI3wVk9wFkShljAAaSOtELNMyYVi5oMEsl8R8+mpu1s4FrB69fpovjIcRc446jRugalCtI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717846671; c=relaxed/simple; bh=GszVp9XVHF6Of3OMjqONaXPF2paZbpxJyg1BfTVgpVc=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=btTAg/iNFomoXCrWViDOq1M6ww79uFMNuebEi2m7qNnY5JKykvl/47rHQQXvhmRLP5puZ08R768jqkAGXXvnQw6NwIVCMe8j6qHdnAVam8KHrHldIWrWSSo0DIfOxn8UaO5rKJicCGx3mkhrOy5rxg4cRQAMXSZO85aPwLuOTqI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=o3fX9huc; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 606D9C2BD11; Sat, 8 Jun 2024 11:37:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1717846670; bh=GszVp9XVHF6Of3OMjqONaXPF2paZbpxJyg1BfTVgpVc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=o3fX9hucK00kQpmhEtXf6LQfo0/57roxsskuXA8p2845DVYnUbVgPz7iLswTMjnDl qcOP0odbD/1BqA2sAhwswInAeWB6J0bPz7UiKxif6J/9HBNKQLRq+1dZM84BZeQM3e jKf7BYqSPDmmisikXQYi3H3Bf8vh64ebQJbaOg7A= Date: Sat, 8 Jun 2024 13:37:45 +0200 From: Greg KH To: "Ivan T. Ivanov" Cc: cve@kernel.org, linux-cve-announce@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: pwm: Fix double shift bug Message-ID: <2024060807-monument-unlocked-781b@gregkh> References: <2024052146-CVE-2023-52756-f694@gregkh> <20240605144305.78002-1-iivanov@suse.de> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240605144305.78002-1-iivanov@suse.de> On Wed, Jun 05, 2024 at 05:43:05PM +0300, Ivan T. Ivanov wrote: > Hi, > > I could argue that this is not CVE at all. It changes just bit positions. > > - PWMF_REQUESTED = 1 << 0, > - PWMF_EXPORTED = 1 << 1, > + PWMF_REQUESTED = 0, > + PWMF_EXPORTED = 1, > > ie. before fix they 1 and 2 and after the fix 0, 1. > > All call sites are using set/test_bit() on unsigned long flags. > > Yes, double shift do not look right, but I don't see how > this could lead to malfunction, let alone a CVE. It could be an issue if the values were larger than 5 as the commit says, but that's not the case here, so you are correct and this has now been rejected as a cve. Thanks for the review! greg k-h