In the Linux kernel, the following vulnerability has been resolved:
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from
known context") by error replaced spin_unlock_irqrestore() with
spin_unlock_irq() for both sync_debugfs_show() and sync_print_obj() despite
sync_print_obj() is called from sync_debugfs_show(), lockdep complains
inconsistent lock state warning.
Use plain spin_{lock,unlock}() for sync_print_obj(), for
sync_debugfs_show() is already using spin_{lock,unlock}_irq().
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 11 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Linux
Published: 2024-06-21T11:15:12.892Z
Updated: 2025-05-04T12:56:57.687Z
Reserved: 2024-06-21T10:12:11.516Z
Link: CVE-2024-38780
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T04:19:20.307Z
 NVD
                        NVD
                    Status : Modified
Published: 2024-06-21T12:15:11.253
Modified: 2024-11-21T09:26:48.823
Link: CVE-2024-38780
 Redhat
                        Redhat