CVE-2026-23202
EUVD-2026-584214.02.2026, 17:15
In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer The curr_xfer field is read by the IRQ handler without holding the lock to check if a transfer is in progress. When clearing curr_xfer in the combined sequence transfer loop, protect it with the spinlock to prevent a race with the interrupt handler. Protect the curr_xfer clearing at the exit path of tegra_qspi_combined_seq_xfer() with the spinlock to prevent a race with the interrupt handler that reads this field. Without this protection, the IRQ handler could read a partially updated curr_xfer value, leading to NULL pointer dereference or use-after-free.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 5.15.198 ≤ 𝑥 < 5.15.200 |
| linux | linux_kernel | 6.1.160 ≤ 𝑥 < 6.1.163 |
| linux | linux_kernel | 6.6.120 ≤ 𝑥 < 6.6.124 |
| linux | linux_kernel | 6.12.63 ≤ 𝑥 < 6.12.70 |
| linux | linux_kernel | 6.17.13 ≤ 𝑥 < 6.18 |
| linux | linux_kernel | 6.18.2 ≤ 𝑥 < 6.18.10 |
| linux | linux_kernel | 6.19:rc1 |
| linux | linux_kernel | 6.19:rc2 |
| linux | linux_kernel | 6.19:rc3 |
| linux | linux_kernel | 6.19:rc4 |
| linux | linux_kernel | 6.19:rc5 |
| linux | linux_kernel | 6.19:rc6 |
| linux | linux_kernel | 6.19:rc7 |
| linux | linux_kernel | 6.19:rc8 |
𝑥
= Vulnerable software versions
Debian Releases
openSUSE / SLES Releases
openSUSE Product | |||||||||
|---|---|---|---|---|---|---|---|---|---|
| cluster-md-kmp-default |
| ||||||||
| dlm-kmp-default |
| ||||||||
| gfs2-kmp-default |
| ||||||||
| kernel-64kb |
| ||||||||
| kernel-azure |
| ||||||||
| kernel-default |
| ||||||||
| kernel-default-base |
| ||||||||
| kernel-docs |
| ||||||||
| kernel-macros |
| ||||||||
| kernel-obs-build |
| ||||||||
| kernel-source |
| ||||||||
| kernel-syms |
| ||||||||
| kernel-zfcpdump |
| ||||||||
| ocfs2-kmp-default |
| ||||||||
| reiserfs-kmp-default |
|
Common Weakness Enumeration
References