CVE-2024-27028

MEDIUM

Linux kernel - Buffer Overflow

Title source: llm

Description

In the Linux kernel, the following vulnerability has been resolved: spi: spi-mt65xx: Fix NULL pointer access in interrupt handler The TX buffer in spi_transfer can be a NULL pointer, so the interrupt handler may end up writing to the invalid memory and cause crashes. Add a check to trans->tx_buf before using it.

Scores

CVSS v3 6.5
EPSS 0.0018
EPSS Percentile 39.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Classification

CWE
CWE-476
Status published

Affected Products (10)

linux/linux_kernel < 4.19.311
debian/debian_linux
linux/Kernel < 4.19.311linux
linux/Kernel < 5.4.273linux
linux/Kernel < 5.10.214linux
linux/Kernel < 5.15.153linux
linux/Kernel < 6.1.83linux
linux/Kernel < 6.6.23linux
linux/Kernel < 6.7.11linux
linux/Kernel < 6.8.2linux

Timeline

Published May 01, 2024
Tracked Since Feb 18, 2026