CVE-2026-23202
EUVD-2026-584214.02.2026, 17:15
In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer The curr_xfer field is read by the IRQ handler without holding the lock to check if a transfer is in progress. When clearing curr_xfer in the combined sequence transfer loop, protect it with the spinlock to prevent a race with the interrupt handler. Protect the curr_xfer clearing at the exit path of tegra_qspi_combined_seq_xfer() with the spinlock to prevent a race with the interrupt handler that reads this field. Without this protection, the IRQ handler could read a partially updated curr_xfer value, leading to NULL pointer dereference or use-after-free.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 5.15.198 ≤ 𝑥 < 5.15.200 |
| linux | linux_kernel | 6.1.160 ≤ 𝑥 < 6.1.163 |
| linux | linux_kernel | 6.6.120 ≤ 𝑥 < 6.6.124 |
| linux | linux_kernel | 6.12.63 ≤ 𝑥 < 6.12.70 |
| linux | linux_kernel | 6.17.13 ≤ 𝑥 < 6.18 |
| linux | linux_kernel | 6.18.2 ≤ 𝑥 < 6.18.10 |
| linux | linux_kernel | 6.19:rc1 |
| linux | linux_kernel | 6.19:rc2 |
| linux | linux_kernel | 6.19:rc3 |
| linux | linux_kernel | 6.19:rc4 |
| linux | linux_kernel | 6.19:rc5 |
| linux | linux_kernel | 6.19:rc6 |
| linux | linux_kernel | 6.19:rc7 |
| linux | linux_kernel | 6.19:rc8 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
Vulnerability Media Exposure
References