CVE-2024-27028

Source
https://cve.org/CVERecord?id=CVE-2024-27028
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27028.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-27028
Downstream
Related
Published
2024-05-01T12:53:19.069Z
Modified
2026-03-14T12:27:44.424857Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L CVSS Calculator
Summary
spi: spi-mt65xx: Fix NULL pointer access in interrupt handler
Details

In the Linux kernel, the following vulnerability has been resolved:

spi: spi-mt65xx: Fix NULL pointer access in interrupt handler

The TX buffer in spi_transfer can be a NULL pointer, so the interrupt handler may end up writing to the invalid memory and cause crashes.

Add a check to trans->tx_buf before using it.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27028.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1ce24864bff40e11500a699789412115fdf244bf
Fixed
2342b05ec5342a519e00524a507f7a6ea6791a38
Fixed
55f8ea6731aa64871ee6aef7dba53ee9f9f3b2f6
Fixed
bcfcdf19698024565eff427706ebbd8df65abd11
Fixed
c10fed329c1c104f375a75ed97ea3abef0786d62
Fixed
766ec94cc57492eab97cbbf1595bd516ab0cb0e4
Fixed
62b1f837b15cf3ec2835724bdf8577e47d14c753
Fixed
bea82355df9e1c299625405b1947fc9b26b4c6d4
Fixed
1784053cf10a14c4ebd8a890bad5cfe1bee51713
Fixed
a20ad45008a7c82f1184dc6dee280096009ece55

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27028.json"