๐Ÿ” CVE Alert

CVE-2026-23207

UNKNOWN 0.0

spi: tegra210-quad: Protect curr_xfer check in IRQ handler

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
3th

In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer check in IRQ handler Now that all other accesses to curr_xfer are done under the lock, protect the curr_xfer NULL check in tegra_qspi_isr_thread() with the spinlock. Without this protection, the following race can occur: CPU0 (ISR thread) CPU1 (timeout path) ---------------- ------------------- if (!tqspi->curr_xfer) // sees non-NULL spin_lock() tqspi->curr_xfer = NULL spin_unlock() handle_*_xfer() spin_lock() t = tqspi->curr_xfer // NULL! ... t->len ... // NULL dereference! With this patch, all curr_xfer accesses are now properly synchronized. Although all accesses to curr_xfer are done under the lock, in tegra_qspi_isr_thread() it checks for NULL, releases the lock and reacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer(). There is a potential for an update in between, which could cause a NULL pointer dereference. To handle this, add a NULL check inside the handlers after acquiring the lock. This ensures that if the timeout path has already cleared curr_xfer, the handler will safely return without dereferencing the NULL pointer.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 14, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
551060efb156c50fe33799038ba8145418cfdeef < 84e926c1c272a35ddb9b86842d32fa833a60dfc7 01bbf25c767219b14c3235bfa85906b8d2cb8fbc < 2ac3a105e51496147c0e44e49466eecfcc532d57 b4e002d8a7cee3b1d70efad0e222567f92a73000 < edf9088b6e1d6d88982db7eb5e736a0e4fbcc09e 88db8bb7ed1bb474618acdf05ebd4f0758d244e2 83309dd551cfd60a5a1a98d9cab19f435b44d46d c934e40246da2c5726d14e94719c514e30840df8 bb0c58be84f907285af45657c1d4847b960a12bf
Linux / Linux
6.12.63 < 6.12.80 6.18.2 < 6.18.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/84e926c1c272a35ddb9b86842d32fa833a60dfc7 git.kernel.org: https://git.kernel.org/stable/c/2ac3a105e51496147c0e44e49466eecfcc532d57 git.kernel.org: https://git.kernel.org/stable/c/edf9088b6e1d6d88982db7eb5e736a0e4fbcc09e