Description
In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer The curr_xfer field is read by the IRQ handler without holding the lock to check if a transfer is in progress. When clearing curr_xfer in the combined sequence transfer loop, protect it with the spinlock to prevent a race with the interrupt handler. Protect the curr_xfer clearing at the exit path of tegra_qspi_combined_seq_xfer() with the spinlock to prevent a race with the interrupt handler that reads this field. Without this protection, the IRQ handler could read a partially updated curr_xfer value, leading to NULL pointer dereference or use-after-free.
References (6)
Scores
CVSS v3
5.5
EPSS
0.0003
EPSS Percentile
7.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-476
Status
published
Products (19)
linux/Kernel
5.15.198 - 5.15.200linux
linux/Kernel
6.1.160 - 6.1.163linux
linux/Kernel
6.12.63 - 6.12.70linux
linux/Kernel
6.18.2 - 6.18.10linux
linux/Kernel
6.6.120 - 6.6.124linux
Linux/Linux
01bbf25c767219b14c3235bfa85906b8d2cb8fbc - 3bc293d5b56502068481478842f57b3d96e432c7
Linux/Linux
5.15.198 - 5.15.200
Linux/Linux
551060efb156c50fe33799038ba8145418cfdeef - 6fd446178a610a48e80e5c5b487b0707cd01daac
Linux/Linux
6.1.160 - 6.1.163
Linux/Linux
6.12.63 - 6.12.70
... and 9 more
Published
Feb 14, 2026
Tracked Since
Feb 18, 2026