CVE-2024-45029

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/09/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> i2c: tegra: Do not mark ACPI devices as irq safe<br /> <br /> On ACPI machines, the tegra i2c module encounters an issue due to a<br /> mutex being called inside a spinlock. This leads to the following bug:<br /> <br /> BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585<br /> ...<br /> <br /> Call trace:<br /> __might_sleep<br /> __mutex_lock_common<br /> mutex_lock_nested<br /> acpi_subsys_runtime_resume<br /> rpm_resume<br /> tegra_i2c_xfer<br /> <br /> The problem arises because during __pm_runtime_resume(), the spinlock<br /> &amp;dev-&gt;power.lock is acquired before rpm_resume() is called. Later,<br /> rpm_resume() invokes acpi_subsys_runtime_resume(), which relies on<br /> mutexes, triggering the error.<br /> <br /> To address this issue, devices on ACPI are now marked as not IRQ-safe,<br /> considering the dependency of acpi_subsys_runtime_resume() on mutexes.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17 (including) 6.1.107 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.48 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*