In the Linux kernel, the following vulnerability has been resolved:
power: supply: bq27xxx-i2c: Do not free non existing IRQ
The bq27xxx i2c-client may not have an IRQ, in which case
client->irq will be 0. bq27xxx_battery_i2c_probe() already has
an if (client->irq) check wrapping the request_threaded_irq().
But bq27xxx_battery_i2c_remove() unconditionally calls
free_irq(client->irq) leading to:
[ 190.310742] ------------[ cut here ]------------
[ 190.310843] Trying to free already-free IRQ 0
[ 190.310861] WARNING: CPU: 2 PID: 1304 at kernel/irq/manage.c:1893 free_irq+0x1b8/0x310
Followed by a backtrace when unbinding the driver. Add
an if (client->irq) to bq27xxx_battery_i2c_remove() mirroring
probe() to fix this.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 19:39
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/083686474e7c97b0f8b66df37fcb64e432e8b771 - Patch | |
| References | () https://git.kernel.org/stable/c/2df70149e73e79783bcbc7db4fa51ecef0e2022c - Patch | |
| References | () https://git.kernel.org/stable/c/7394abc8926adee6a817bab10797e0adc898af77 - Patch | |
| References | () https://git.kernel.org/stable/c/cefe18e9ec84f8fe3e198ccebb815cc996eb9797 - Patch | |
| References | () https://git.kernel.org/stable/c/d4d813c0a14d6bf52d810a55db06a2e7e3d98eaa - Patch | |
| References | () https://git.kernel.org/stable/c/d7acc4a569f5f4513120c85ea2b9f04909b7490f - Patch | |
| References | () https://git.kernel.org/stable/c/e601ae81910ce6a3797876e190a2d8ef6cf828bc - Patch | |
| References | () https://git.kernel.org/stable/c/fbca8bae1ba79d443a58781b45e92a73a24ac8f8 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
21 Nov 2024, 09:04
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/083686474e7c97b0f8b66df37fcb64e432e8b771 - | |
| References | () https://git.kernel.org/stable/c/2df70149e73e79783bcbc7db4fa51ecef0e2022c - | |
| References | () https://git.kernel.org/stable/c/7394abc8926adee6a817bab10797e0adc898af77 - | |
| References | () https://git.kernel.org/stable/c/cefe18e9ec84f8fe3e198ccebb815cc996eb9797 - | |
| References | () https://git.kernel.org/stable/c/d4d813c0a14d6bf52d810a55db06a2e7e3d98eaa - | |
| References | () https://git.kernel.org/stable/c/d7acc4a569f5f4513120c85ea2b9f04909b7490f - | |
| References | () https://git.kernel.org/stable/c/e601ae81910ce6a3797876e190a2d8ef6cf828bc - | |
| References | () https://git.kernel.org/stable/c/fbca8bae1ba79d443a58781b45e92a73a24ac8f8 - |
06 Nov 2024, 15:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
05 Nov 2024, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jun 2024, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
17 May 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-17 12:15
Updated : 2025-12-17 19:39
NVD link : CVE-2024-27412
Mitre link : CVE-2024-27412
CVE.ORG link : CVE-2024-27412
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
