CVE-2026-23202

MEDIUM

Linux Kernel - Buffer Overflow

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer The curr_xfer field is read by the IRQ handler without holding the lock to check if a transfer is in progress. When clearing curr_xfer in the combined sequence transfer loop, protect it with the spinlock to prevent a race with the interrupt handler. Protect the curr_xfer clearing at the exit path of tegra_qspi_combined_seq_xfer() with the spinlock to prevent a race with the interrupt handler that reads this field. Without this protection, the IRQ handler could read a partially updated curr_xfer value, leading to NULL pointer dereference or use-after-free.

Scores

CVSS v3 5.5
EPSS 0.0003
EPSS Percentile 7.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-476
Status published
Products (19)
linux/Kernel 5.15.198 - 5.15.200linux
linux/Kernel 6.1.160 - 6.1.163linux
linux/Kernel 6.12.63 - 6.12.70linux
linux/Kernel 6.18.2 - 6.18.10linux
linux/Kernel 6.6.120 - 6.6.124linux
Linux/Linux 01bbf25c767219b14c3235bfa85906b8d2cb8fbc - 3bc293d5b56502068481478842f57b3d96e432c7
Linux/Linux 5.15.198 - 5.15.200
Linux/Linux 551060efb156c50fe33799038ba8145418cfdeef - 6fd446178a610a48e80e5c5b487b0707cd01daac
Linux/Linux 6.1.160 - 6.1.163
Linux/Linux 6.12.63 - 6.12.70
... and 9 more
Published Feb 14, 2026
Tracked Since Feb 18, 2026