๐Ÿ” CVE Alert

CVE-2024-45029

UNKNOWN 0.0

i2c: tegra: Do not mark ACPI devices as irq safe

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: i2c: tegra: Do not mark ACPI devices as irq safe On ACPI machines, the tegra i2c module encounters an issue due to a mutex being called inside a spinlock. This leads to the following bug: BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585 ... Call trace: __might_sleep __mutex_lock_common mutex_lock_nested acpi_subsys_runtime_resume rpm_resume tegra_i2c_xfer The problem arises because during __pm_runtime_resume(), the spinlock &dev->power.lock is acquired before rpm_resume() is called. Later, rpm_resume() invokes acpi_subsys_runtime_resume(), which relies on mutexes, triggering the error. To address this issue, devices on ACPI are now marked as not IRQ-safe, considering the dependency of acpi_subsys_runtime_resume() on mutexes.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 11, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
bd2fdedbf2bac27f4a2ac16b84ab9b9e5f67006c < a89aef1e6cc43fa019a58080ed05c839e6c77876 bd2fdedbf2bac27f4a2ac16b84ab9b9e5f67006c < 6861faf4232e4b78878f2de1ed3ee324ddae2287 bd2fdedbf2bac27f4a2ac16b84ab9b9e5f67006c < 2853e1376d8161b04c9ff18ba82b43f08a049905 bd2fdedbf2bac27f4a2ac16b84ab9b9e5f67006c < 14d069d92951a3e150c0a81f2ca3b93e54da913b
Linux / Linux
5.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a89aef1e6cc43fa019a58080ed05c839e6c77876 git.kernel.org: https://git.kernel.org/stable/c/6861faf4232e4b78878f2de1ed3ee324ddae2287 git.kernel.org: https://git.kernel.org/stable/c/2853e1376d8161b04c9ff18ba82b43f08a049905 git.kernel.org: https://git.kernel.org/stable/c/14d069d92951a3e150c0a81f2ca3b93e54da913b lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html