{"id":"CVE-2026-23202","summary":"spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer\n\nThe curr_xfer field is read by the IRQ handler without holding the lock\nto check if a transfer is in progress. When clearing curr_xfer in the\ncombined sequence transfer loop, protect it with the spinlock to prevent\na race with the interrupt handler.\n\nProtect the curr_xfer clearing at the exit path of\ntegra_qspi_combined_seq_xfer() with the spinlock to prevent a race\nwith the interrupt handler that reads this field.\n\nWithout this protection, the IRQ handler could read a partially updated\ncurr_xfer value, leading to NULL pointer dereference or use-after-free.","modified":"2026-04-28T18:44:37.183289827Z","published":"2026-02-14T16:27:26.365Z","related":["SUSE-SU-2026:0962-1","SUSE-SU-2026:1041-1","SUSE-SU-2026:1081-1","SUSE-SU-2026:20667-1","SUSE-SU-2026:20720-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","SUSE-SU-2026:20931-1","SUSE-SU-2026:21114-1","SUSE-SU-2026:21123-1","SUSE-SU-2026:21255-1","SUSE-SU-2026:21284-1","openSUSE-SU-2026:20416-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23202.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3bc293d5b56502068481478842f57b3d96e432c7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6fd446178a610a48e80e5c5b487b0707cd01daac"},{"type":"WEB","url":"https://git.kernel.org/stable/c/712cde8d916889e282727cdf304a43683adf899e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/762e2ce71c8f0238e9eaf05d14da803d9a24422f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9fa4262a80f751d14a6a39d2c03f57db68da2618"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bf4528ab28e2bf112c3a2cdef44fd13f007781cd"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23202.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23202"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"88db8bb7ed1bb474618acdf05ebd4f0758d244e2"},{"fixed":"9fa4262a80f751d14a6a39d2c03f57db68da2618"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"83309dd551cfd60a5a1a98d9cab19f435b44d46d"},{"fixed":"762e2ce71c8f0238e9eaf05d14da803d9a24422f"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c934e40246da2c5726d14e94719c514e30840df8"},{"fixed":"712cde8d916889e282727cdf304a43683adf899e"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"551060efb156c50fe33799038ba8145418cfdeef"},{"fixed":"6fd446178a610a48e80e5c5b487b0707cd01daac"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"01bbf25c767219b14c3235bfa85906b8d2cb8fbc"},{"fixed":"3bc293d5b56502068481478842f57b3d96e432c7"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b4e002d8a7cee3b1d70efad0e222567f92a73000"},{"fixed":"bf4528ab28e2bf112c3a2cdef44fd13f007781cd"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"bb0c58be84f907285af45657c1d4847b960a12bf"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23202.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.15.198"},{"fixed":"5.15.200"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.160"},{"fixed":"6.1.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.6.120"},{"fixed":"6.6.124"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.12.63"},{"fixed":"6.12.70"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.18.2"},{"fixed":"6.18.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23202.json"}}],"schema_version":"1.7.5"}