CVE-2024-27028
MEDIUMLinux kernel - Buffer Overflow
Title source: llmDescription
In the Linux kernel, the following vulnerability has been resolved: spi: spi-mt65xx: Fix NULL pointer access in interrupt handler The TX buffer in spi_transfer can be a NULL pointer, so the interrupt handler may end up writing to the invalid memory and cause crashes. Add a check to trans->tx_buf before using it.
References (11)
Scores
CVSS v3
6.5
EPSS
0.0018
EPSS Percentile
39.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Classification
CWE
CWE-476
Status
published
Affected Products (10)
linux/linux_kernel
< 4.19.311
debian/debian_linux
linux/Kernel
< 4.19.311linux
linux/Kernel
< 5.4.273linux
linux/Kernel
< 5.10.214linux
linux/Kernel
< 5.15.153linux
linux/Kernel
< 6.1.83linux
linux/Kernel
< 6.6.23linux
linux/Kernel
< 6.7.11linux
linux/Kernel
< 6.8.2linux
Timeline
Published
May 01, 2024
Tracked Since
Feb 18, 2026