๐Ÿ” CVE Alert

CVE-2024-49955

UNKNOWN 0.0

ACPI: battery: Fix possible crash when unregistering a battery hook

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ACPI: battery: Fix possible crash when unregistering a battery hook When a battery hook returns an error when adding a new battery, then the battery hook is automatically unregistered. However the battery hook provider cannot know that, so it will later call battery_hook_unregister() on the already unregistered battery hook, resulting in a crash. Fix this by using the list head to mark already unregistered battery hooks as already being unregistered so that they can be ignored by battery_hook_unregister().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
fa93854f7a7ed63d054405bf3779247d5300edd3 < 76fb2cbf01571926da8ecf6876cc8cb07d3f5183 fa93854f7a7ed63d054405bf3779247d5300edd3 < c47843a831e0eae007ad7e848d208e675ba4c132 fa93854f7a7ed63d054405bf3779247d5300edd3 < da964de4c18199e14b961b5b2e5e6570552a313c fa93854f7a7ed63d054405bf3779247d5300edd3 < 07b98400cb0285a6348188aa8c5ec6a2ae0551f7 fa93854f7a7ed63d054405bf3779247d5300edd3 < ca1fb7942a287b40659cc79551a1de54a2c2e7d5 fa93854f7a7ed63d054405bf3779247d5300edd3 < ce31847f109c3a5b2abdd19d7bcaafaacfde53de fa93854f7a7ed63d054405bf3779247d5300edd3 < ca26e8eed9c1c6651f51f7fa38fe444f8573cd1b fa93854f7a7ed63d054405bf3779247d5300edd3 < 9f469ef1c79dac7f9ac1518643a33703918f7e13 fa93854f7a7ed63d054405bf3779247d5300edd3 < 76959aff14a0012ad6b984ec7686d163deccdc16
Linux / Linux
4.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/76fb2cbf01571926da8ecf6876cc8cb07d3f5183 git.kernel.org: https://git.kernel.org/stable/c/c47843a831e0eae007ad7e848d208e675ba4c132 git.kernel.org: https://git.kernel.org/stable/c/da964de4c18199e14b961b5b2e5e6570552a313c git.kernel.org: https://git.kernel.org/stable/c/07b98400cb0285a6348188aa8c5ec6a2ae0551f7 git.kernel.org: https://git.kernel.org/stable/c/ca1fb7942a287b40659cc79551a1de54a2c2e7d5 git.kernel.org: https://git.kernel.org/stable/c/ce31847f109c3a5b2abdd19d7bcaafaacfde53de git.kernel.org: https://git.kernel.org/stable/c/ca26e8eed9c1c6651f51f7fa38fe444f8573cd1b git.kernel.org: https://git.kernel.org/stable/c/9f469ef1c79dac7f9ac1518643a33703918f7e13 git.kernel.org: https://git.kernel.org/stable/c/76959aff14a0012ad6b984ec7686d163deccdc16 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html