CVE-2024-45029

In the Linux kernel, the following vulnerability has been resolved: i2c: tegra: Do not mark ACPI devices as irq safe On ACPI machines, the tegra i2c module encounters an issue due to a mutex being called inside a spinlock. This leads to the following bug: BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585 ... Call trace: __might_sleep __mutex_lock_common mutex_lock_nested acpi_subsys_runtime_resume rpm_resume tegra_i2c_xfer The problem arises because during __pm_runtime_resume(), the spinlock &dev->power.lock is acquired before rpm_resume() is called. Later, rpm_resume() invokes acpi_subsys_runtime_resume(), which relies on mutexes, triggering the error. To address this issue, devices on ACPI are now marked as not IRQ-safe, considering the dependency of acpi_subsys_runtime_resume() on mutexes.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*

History

13 Sep 2024, 16:29

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i2c: tegra: No marcar dispositivos ACPI como seguros para irq En máquinas ACPI, el módulo tegra i2c encuentra un problema debido a que se llama a un mutex dentro de un spinlock. Esto lleva al siguiente error: BUG: función dormida llamada desde un contexto no válido en kernel/locking/mutex.c:585 ... Rastreo de llamada: __might_sleep __mutex_lock_common mutex_lock_nested acpi_subsys_runtime_resume rpm_resume tegra_i2c_xfer El problema surge porque durante __pm_runtime_resume(), se adquiere el spinlock &dev->power.lock antes de que se llame a rpm_resume(). Más tarde, rpm_resume() invoca acpi_subsys_runtime_resume(), que se basa en mutexes, lo que activa el error. Para solucionar este problema, los dispositivos en ACPI ahora están marcados como no seguros para IRQ, considerando la dependencia de acpi_subsys_runtime_resume() en los mutex.
References () https://git.kernel.org/stable/c/14d069d92951a3e150c0a81f2ca3b93e54da913b - () https://git.kernel.org/stable/c/14d069d92951a3e150c0a81f2ca3b93e54da913b - Patch
References () https://git.kernel.org/stable/c/2853e1376d8161b04c9ff18ba82b43f08a049905 - () https://git.kernel.org/stable/c/2853e1376d8161b04c9ff18ba82b43f08a049905 - Patch
References () https://git.kernel.org/stable/c/6861faf4232e4b78878f2de1ed3ee324ddae2287 - () https://git.kernel.org/stable/c/6861faf4232e4b78878f2de1ed3ee324ddae2287 - Patch
References () https://git.kernel.org/stable/c/a89aef1e6cc43fa019a58080ed05c839e6c77876 - () https://git.kernel.org/stable/c/a89aef1e6cc43fa019a58080ed05c839e6c77876 - Patch
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-667

11 Sep 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-11 16:15

Updated : 2024-09-13 16:29


NVD link : CVE-2024-45029

Mitre link : CVE-2024-45029

CVE.ORG link : CVE-2024-45029


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking