In the Linux kernel, the following vulnerability has been resolved:
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from
known context") by error replaced spin_unlock_irqrestore() with
spin_unlock_irq() for both sync_debugfs_show() and sync_print_obj() despite
sync_print_obj() is called from sync_debugfs_show(), lockdep complains
inconsistent lock state warning.
Use plain spin_{lock,unlock}() for sync_print_obj(), for
sync_debugfs_show() is already using spin_{lock,unlock}_irq().
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-06-21T11:15:12.892Z
Updated: 2024-12-19T09:06:24.532Z
Reserved: 2024-06-21T10:12:11.516Z
Link: CVE-2024-38780
Vulnrichment
Updated: 2024-08-02T04:19:20.307Z
NVD
Status : Modified
Published: 2024-06-21T12:15:11.253
Modified: 2024-11-21T09:26:48.823
Link: CVE-2024-38780
Redhat