CVE-2024-38780

In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don't enable IRQ from sync_print_obj() Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from known context") by error replaced spin_unlock_irqrestore() with spin_unlock_irq() for both sync_debugfs_show() and sync_print_obj() despite sync_print_obj() is called from sync_debugfs_show(), lockdep complains inconsistent lock state warning. Use plain spin_{lock,unlock}() for sync_print_obj(), for sync_debugfs_show() is already using spin_{lock,unlock}_irq().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*

History

15 Jul 2024, 07:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

24 Jun 2024, 19:17

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-667
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/165b25e3ee9333f7b04f8db43895beacb51582ed - () https://git.kernel.org/stable/c/165b25e3ee9333f7b04f8db43895beacb51582ed - Mailing List, Patch
References () https://git.kernel.org/stable/c/1ff116f68560a25656933d5a18e7619cb6773d8a - () https://git.kernel.org/stable/c/1ff116f68560a25656933d5a18e7619cb6773d8a - Mailing List, Patch
References () https://git.kernel.org/stable/c/242b30466879e6defa521573c27e12018276c33a - () https://git.kernel.org/stable/c/242b30466879e6defa521573c27e12018276c33a - Mailing List, Patch
References () https://git.kernel.org/stable/c/8a283cdfc8beeb14024387a925247b563d614e1e - () https://git.kernel.org/stable/c/8a283cdfc8beeb14024387a925247b563d614e1e - Mailing List, Patch
References () https://git.kernel.org/stable/c/9d75fab2c14a25553a1664586ed122c316bd1878 - () https://git.kernel.org/stable/c/9d75fab2c14a25553a1664586ed122c316bd1878 - Mailing List, Patch
References () https://git.kernel.org/stable/c/a4ee78244445ab73af22bfc5a5fc543963b25aef - () https://git.kernel.org/stable/c/a4ee78244445ab73af22bfc5a5fc543963b25aef - Mailing List, Patch
References () https://git.kernel.org/stable/c/ae6fc4e6a3322f6d1c8ff59150d8469487a73dd8 - () https://git.kernel.org/stable/c/ae6fc4e6a3322f6d1c8ff59150d8469487a73dd8 - Mailing List, Patch
References () https://git.kernel.org/stable/c/b794918961516f667b0c745aebdfebbb8a98df39 - () https://git.kernel.org/stable/c/b794918961516f667b0c745aebdfebbb8a98df39 - Mailing List, Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dma-buf/sw-sync: no habilitar IRQ desde sync_print_obj() Desde el commit a6aa8fca4d79 ("dma-buf/sw-sync: reducir irqsave/irqrestore desde el contexto conocido" ) por error reemplazó spin_unlock_irqrestore() con spin_unlock_irq() tanto para sync_debugfs_show() como para sync_print_obj() a pesar de que sync_print_obj() se llama desde sync_debugfs_show(), lockdep se queja de una advertencia de estado de bloqueo inconsistente. Utilice spin_{lock,unlock}() simple para sync_print_obj(), ya que sync_debugfs_show() ya está usando spin_{lock,unlock}_irq().

21 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-21 12:15

Updated : 2024-07-15 07:15


NVD link : CVE-2024-38780

Mitre link : CVE-2024-38780

CVE.ORG link : CVE-2024-38780


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking