CVE-2024-45029

In the Linux kernel, the following vulnerability has been resolved: i2c: tegra: Do not mark ACPI devices as irq safe On ACPI machines, the tegra i2c module encounters an issue due to a mutex being called inside a spinlock. This leads to the following bug: BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585 ... Call trace: __might_sleep __mutex_lock_common mutex_lock_nested acpi_subsys_runtime_resume rpm_resume tegra_i2c_xfer The problem arises because during __pm_runtime_resume(), the spinlock &dev->power.lock is acquired before rpm_resume() is called. Later, rpm_resume() invokes acpi_subsys_runtime_resume(), which relies on mutexes, triggering the error. To address this issue, devices on ACPI are now marked as not IRQ-safe, considering the dependency of acpi_subsys_runtime_resume() on mutexes.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Sep 2024, 16:29

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/14d069d92951a3e150c0a81f2ca3b93e54da913b - () https://git.kernel.org/stable/c/14d069d92951a3e150c0a81f2ca3b93e54da913b - Patch
References () https://git.kernel.org/stable/c/a89aef1e6cc43fa019a58080ed05c839e6c77876 - () https://git.kernel.org/stable/c/a89aef1e6cc43fa019a58080ed05c839e6c77876 - Patch
References () https://git.kernel.org/stable/c/2853e1376d8161b04c9ff18ba82b43f08a049905 - () https://git.kernel.org/stable/c/2853e1376d8161b04c9ff18ba82b43f08a049905 - Patch
References () https://git.kernel.org/stable/c/6861faf4232e4b78878f2de1ed3ee324ddae2287 - () https://git.kernel.org/stable/c/6861faf4232e4b78878f2de1ed3ee324ddae2287 - Patch
CWE CWE-667
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

11 Sep 2024, 16:26

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-11 16:15

Updated : 2024-09-13 16:29


NVD link : CVE-2024-45029

Mitre link : CVE-2024-45029


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking