NULL pointer dereference in Linux kernel - CVE-2023-52749
Published: May 31, 2024 / Updated: May 14, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the spi_unregister_controller(), __spi_transfer_message_noqueue() and __spi_sync() functions in drivers/spi/spi.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/4ec4508db97502a12daee88c74782e8d35ced068
- https://git.kernel.org/stable/c/96474ea47dc67b0704392d59192b233c8197db0e
- https://git.kernel.org/stable/c/bef4a48f4ef798c4feddf045d49e53c8a97d5e37
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.66
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7