CVE-2024-45029

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-45029
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-45029.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-45029
Downstream
Related
Published
2024-09-11T15:14:00.260Z
Modified
2025-11-28T02:33:49.395404Z
Summary
i2c: tegra: Do not mark ACPI devices as irq safe
Details

In the Linux kernel, the following vulnerability has been resolved:

i2c: tegra: Do not mark ACPI devices as irq safe

On ACPI machines, the tegra i2c module encounters an issue due to a mutex being called inside a spinlock. This leads to the following bug:

BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585
...

Call trace:
__might_sleep
__mutex_lock_common
mutex_lock_nested
acpi_subsys_runtime_resume
rpm_resume
tegra_i2c_xfer

The problem arises because during _pmruntimeresume(), the spinlock &dev->power.lock is acquired before rpmresume() is called. Later, rpmresume() invokes acpisubsysruntimeresume(), which relies on mutexes, triggering the error.

To address this issue, devices on ACPI are now marked as not IRQ-safe, considering the dependency of acpisubsysruntime_resume() on mutexes.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/45xxx/CVE-2024-45029.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bd2fdedbf2bac27f4a2ac16b84ab9b9e5f67006c
Fixed
a89aef1e6cc43fa019a58080ed05c839e6c77876
Fixed
6861faf4232e4b78878f2de1ed3ee324ddae2287
Fixed
2853e1376d8161b04c9ff18ba82b43f08a049905
Fixed
14d069d92951a3e150c0a81f2ca3b93e54da913b

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
6.1.107
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.48
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.7