CVE-2024-27412

In the Linux kernel, the following vulnerability has been resolved: power: supply: bq27xxx-i2c: Do not free non existing IRQ The bq27xxx i2c-client may not have an IRQ, in which case client->irq will be 0. bq27xxx_battery_i2c_probe() already has an if (client->irq) check wrapping the request_threaded_irq(). But bq27xxx_battery_i2c_remove() unconditionally calls free_irq(client->irq) leading to: [ 190.310742] ------------[ cut here ]------------ [ 190.310843] Trying to free already-free IRQ 0 [ 190.310861] WARNING: CPU: 2 PID: 1304 at kernel/irq/manage.c:1893 free_irq+0x1b8/0x310 Followed by a backtrace when unbinding the driver. Add an if (client->irq) to bq27xxx_battery_i2c_remove() mirroring probe() to fix this.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

17 Dec 2025, 19:39

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/083686474e7c97b0f8b66df37fcb64e432e8b771 - () https://git.kernel.org/stable/c/083686474e7c97b0f8b66df37fcb64e432e8b771 - Patch
References () https://git.kernel.org/stable/c/2df70149e73e79783bcbc7db4fa51ecef0e2022c - () https://git.kernel.org/stable/c/2df70149e73e79783bcbc7db4fa51ecef0e2022c - Patch
References () https://git.kernel.org/stable/c/7394abc8926adee6a817bab10797e0adc898af77 - () https://git.kernel.org/stable/c/7394abc8926adee6a817bab10797e0adc898af77 - Patch
References () https://git.kernel.org/stable/c/cefe18e9ec84f8fe3e198ccebb815cc996eb9797 - () https://git.kernel.org/stable/c/cefe18e9ec84f8fe3e198ccebb815cc996eb9797 - Patch
References () https://git.kernel.org/stable/c/d4d813c0a14d6bf52d810a55db06a2e7e3d98eaa - () https://git.kernel.org/stable/c/d4d813c0a14d6bf52d810a55db06a2e7e3d98eaa - Patch
References () https://git.kernel.org/stable/c/d7acc4a569f5f4513120c85ea2b9f04909b7490f - () https://git.kernel.org/stable/c/d7acc4a569f5f4513120c85ea2b9f04909b7490f - Patch
References () https://git.kernel.org/stable/c/e601ae81910ce6a3797876e190a2d8ef6cf828bc - () https://git.kernel.org/stable/c/e601ae81910ce6a3797876e190a2d8ef6cf828bc - Patch
References () https://git.kernel.org/stable/c/fbca8bae1ba79d443a58781b45e92a73a24ac8f8 - () https://git.kernel.org/stable/c/fbca8bae1ba79d443a58781b45e92a73a24ac8f8 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

21 Nov 2024, 09:04

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/083686474e7c97b0f8b66df37fcb64e432e8b771 - () https://git.kernel.org/stable/c/083686474e7c97b0f8b66df37fcb64e432e8b771 -
References () https://git.kernel.org/stable/c/2df70149e73e79783bcbc7db4fa51ecef0e2022c - () https://git.kernel.org/stable/c/2df70149e73e79783bcbc7db4fa51ecef0e2022c -
References () https://git.kernel.org/stable/c/7394abc8926adee6a817bab10797e0adc898af77 - () https://git.kernel.org/stable/c/7394abc8926adee6a817bab10797e0adc898af77 -
References () https://git.kernel.org/stable/c/cefe18e9ec84f8fe3e198ccebb815cc996eb9797 - () https://git.kernel.org/stable/c/cefe18e9ec84f8fe3e198ccebb815cc996eb9797 -
References () https://git.kernel.org/stable/c/d4d813c0a14d6bf52d810a55db06a2e7e3d98eaa - () https://git.kernel.org/stable/c/d4d813c0a14d6bf52d810a55db06a2e7e3d98eaa -
References () https://git.kernel.org/stable/c/d7acc4a569f5f4513120c85ea2b9f04909b7490f - () https://git.kernel.org/stable/c/d7acc4a569f5f4513120c85ea2b9f04909b7490f -
References () https://git.kernel.org/stable/c/e601ae81910ce6a3797876e190a2d8ef6cf828bc - () https://git.kernel.org/stable/c/e601ae81910ce6a3797876e190a2d8ef6cf828bc -
References () https://git.kernel.org/stable/c/fbca8bae1ba79d443a58781b45e92a73a24ac8f8 - () https://git.kernel.org/stable/c/fbca8bae1ba79d443a58781b45e92a73a24ac8f8 -

06 Nov 2024, 15:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: alimentación: suministro: bq27xxx-i2c: no liberar IRQ no existente Es posible que el cliente bq27xxx i2c no tenga una IRQ, en cuyo caso client->irq será 0. bq27xxx_battery_i2c_probe( ) ya tiene una verificación if (cliente->irq) que envuelve request_threaded_irq(). Pero bq27xxx_battery_i2c_remove() llama incondicionalmente a free_irq(cliente->irq) lo que lleva a: [190.310742] ------------[ cortar aquí ]------------ [ 190.310843] Intentando liberar IRQ 0 [190.310861] que ya está libre ADVERTENCIA: CPU: 2 PID: 1304 en kernel/irq/manage.c:1893 free_irq+0x1b8/0x310 Seguido de un seguimiento al desvincular el controlador. Agregue un if (cliente->irq) a bq27xxx_battery_i2c_remove() mirroring probe() para solucionar este problema.

17 May 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 12:15

Updated : 2025-12-17 19:39


NVD link : CVE-2024-27412

Mitre link : CVE-2024-27412

CVE.ORG link : CVE-2024-27412


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel