Resource management error in Linux kernel power supply driver



| Updated: 2025-05-13
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-27412
CWE-ID CWE-399
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Resource management error

EUVDB-ID: #VU93194

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27412

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the bq27xxx_battery_i2c_remove() function in drivers/power/supply/bq27xxx_battery_i2c.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.19 - 6.8 rc5

CPE2.3 External links

https://git.kernel.org/stable/c/d4d813c0a14d6bf52d810a55db06a2e7e3d98eaa
https://git.kernel.org/stable/c/7394abc8926adee6a817bab10797e0adc898af77
https://git.kernel.org/stable/c/d7acc4a569f5f4513120c85ea2b9f04909b7490f
https://git.kernel.org/stable/c/e601ae81910ce6a3797876e190a2d8ef6cf828bc
https://git.kernel.org/stable/c/cefe18e9ec84f8fe3e198ccebb815cc996eb9797
https://git.kernel.org/stable/c/fbca8bae1ba79d443a58781b45e92a73a24ac8f8
https://git.kernel.org/stable/c/083686474e7c97b0f8b66df37fcb64e432e8b771
https://git.kernel.org/stable/c/2df70149e73e79783bcbc7db4fa51ecef0e2022c
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.309
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.212
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.151
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.271
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.81
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.21
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.9
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###