CVE-2024-38780

Source
https://cve.org/CVERecord?id=CVE-2024-38780
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38780.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-38780
Downstream
Related
Published
2024-06-21T11:15:12.892Z
Modified
2026-03-14T12:34:37.578822Z
Summary
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
Details

In the Linux kernel, the following vulnerability has been resolved:

dma-buf/sw-sync: don't enable IRQ from syncprintobj()

Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from known context") by error replaced spinunlockirqrestore() with spinunlockirq() for both syncdebugfsshow() and syncprintobj() despite syncprintobj() is called from syncdebugfsshow(), lockdep complains inconsistent lock state warning.

Use plain spin_{lock,unlock}() for syncprintobj(), for syncdebugfsshow() is already using spin_{lock,unlock}_irq().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38780.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a6aa8fca4d792c72947e341d7842d2f700534335
Fixed
1ff116f68560a25656933d5a18e7619cb6773d8a
Fixed
165b25e3ee9333f7b04f8db43895beacb51582ed
Fixed
ae6fc4e6a3322f6d1c8ff59150d8469487a73dd8
Fixed
9d75fab2c14a25553a1664586ed122c316bd1878
Fixed
242b30466879e6defa521573c27e12018276c33a
Fixed
a4ee78244445ab73af22bfc5a5fc543963b25aef
Fixed
8a283cdfc8beeb14024387a925247b563d614e1e
Fixed
b794918961516f667b0c745aebdfebbb8a98df39
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
f14ad42b8743897d140808467ed4ae3ce93bd0a5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38780.json"