CVE-2024-45029

MEDIUM

Linux Kernel - DoS

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: i2c: tegra: Do not mark ACPI devices as irq safe On ACPI machines, the tegra i2c module encounters an issue due to a mutex being called inside a spinlock. This leads to the following bug: BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585 ... Call trace: __might_sleep __mutex_lock_common mutex_lock_nested acpi_subsys_runtime_resume rpm_resume tegra_i2c_xfer The problem arises because during __pm_runtime_resume(), the spinlock &dev->power.lock is acquired before rpm_resume() is called. Later, rpm_resume() invokes acpi_subsys_runtime_resume(), which relies on mutexes, triggering the error. To address this issue, devices on ACPI are now marked as not IRQ-safe, considering the dependency of acpi_subsys_runtime_resume() on mutexes.

Scores

CVSS v3 5.5
EPSS 0.0002
EPSS Percentile 5.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-667
Status published
Products (5)
linux/Kernel 5.17.0 - 6.1.107linux
linux/Kernel 6.2.0 - 6.6.48linux
linux/Kernel 6.7.0 - 6.10.7linux
linux/linux_kernel 6.11 rc1 (3 CPE variants)
linux/linux_kernel 5.17 - 6.1.107
Published Sep 11, 2024
Tracked Since Feb 18, 2026