{"id":"CVE-2024-26776","summary":"spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nspi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected\n\nReturn IRQ_NONE from the interrupt handler when no interrupt was\ndetected. Because an empty interrupt will cause a null pointer error:\n\n    Unable to handle kernel NULL pointer dereference at virtual\n  address 0000000000000008\n    Call trace:\n        complete+0x54/0x100\n        hisi_sfc_v3xx_isr+0x2c/0x40 [spi_hisi_sfc_v3xx]\n        __handle_irq_event_percpu+0x64/0x1e0\n        handle_irq_event+0x7c/0x1cc","modified":"2026-04-02T10:05:58.051126Z","published":"2024-04-03T17:01:02.116Z","related":["SUSE-SU-2024:1490-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26776.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0399d7eba41d9b28f5bdd7757ec21a5b7046858d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d637b5118274701e8448f35953877daf04df18b4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/de8b6e1c231a95abf95ad097b993d34b31458ec9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e4168ac25b4bd378bd7dda322d589482a136c1fd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e94da8aca2e78ef9ecca02eb211869eacd5504e5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f19361d570c67e7e014896fa2dacd7d721bf0aa8"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26776.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26776"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a2ca53b52e007de81752bbb443d828f5950d6d04"},{"fixed":"e94da8aca2e78ef9ecca02eb211869eacd5504e5"},{"fixed":"0399d7eba41d9b28f5bdd7757ec21a5b7046858d"},{"fixed":"f19361d570c67e7e014896fa2dacd7d721bf0aa8"},{"fixed":"d637b5118274701e8448f35953877daf04df18b4"},{"fixed":"e4168ac25b4bd378bd7dda322d589482a136c1fd"},{"fixed":"de8b6e1c231a95abf95ad097b993d34b31458ec9"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26776.json"}}],"schema_version":"1.7.5"}