DNA View

CVE-2026-23202

Medium
Low Medium High Critical
5.5
CVSS Score
Published: Feb 14, 2026
Last Modified: Mar 19, 2026

Vulnerability Description

In the Linux kernel, the following vulnerability has been resolved:

spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer

The curr_xfer field is read by the IRQ handler without holding the lock
to check if a transfer is in progress. When clearing curr_xfer in the
combined sequence transfer loop, protect it with the spinlock to prevent
a race with the interrupt handler.

Protect the curr_xfer clearing at the exit path of
tegra_qspi_combined_seq_xfer() with the spinlock to prevent a race
with the interrupt handler that reads this field.

Without this protection, the IRQ handler could read a partially updated
curr_xfer value, leading to NULL pointer dereference or use-after-free.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
L
Attack Complexity
L
Privileges Required
L
User Interaction
N
Scope
U
Confidentiality
N
Integrity
N
Availability
H

Known Affected Software

12 configuration(s) from 1 vendor(s)

linux_kernel
Version:
6.12.67
CPE:
cpe:2.3:o:linux:linux_kernel:6.12.67:*:*:*:*:*:*:*
linux_kernel
Version:
6.1.160
CPE:
cpe:2.3:o:linux:linux_kernel:6.1.160:*:*:*:*:*:*:*
linux_kernel
Version:
6.6.122
CPE:
cpe:2.3:o:linux:linux_kernel:6.6.122:*:*:*:*:*:*:*
linux_kernel
Version:
6.18.3
CPE:
cpe:2.3:o:linux:linux_kernel:6.18.3:*:*:*:*:*:*:*
linux_kernel
Version:
6.12.68
CPE:
cpe:2.3:o:linux:linux_kernel:6.12.68:*:*:*:*:*:*:*
linux_kernel
Version:
6.18.8
CPE:
cpe:2.3:o:linux:linux_kernel:6.18.8:*:*:*:*:*:*:*
linux_kernel
Version:
6.6.120
CPE:
cpe:2.3:o:linux:linux_kernel:6.6.120:*:*:*:*:*:*:*
linux_kernel
Version:
6.18.7
CPE:
cpe:2.3:o:linux:linux_kernel:6.18.7:*:*:*:*:*:*:*
linux_kernel
Version:
6.18.2
CPE:
cpe:2.3:o:linux:linux_kernel:6.18.2:*:*:*:*:*:*:*
linux_kernel
Version:
6.17.13
CPE:
cpe:2.3:o:linux:linux_kernel:6.17.13:*:*:*:*:*:*:*
linux_kernel
Version:
6.19
CPE:
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
linux_kernel
Version:
6.12.63
CPE:
cpe:2.3:o:linux:linux_kernel:6.12.63:*:*:*:*:*:*:*
This vulnerability affects 12 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

4 patches available from vendors

View All Patches
Canonical (Ubuntu)

USN-8163-2

USN-8163-2: Linux kernel (Azure) vulnerabilities

Severity
Unknown
Released
Apr 13, 2026
Restart Required
Security Update
Canonical (Ubuntu)

USN-8163-1

USN-8163-1: Linux kernel (Azure FIPS) vulnerabilities

Severity
Unknown
Released
Apr 09, 2026
Restart Required
Security Update
Canonical (Ubuntu)

USN-8100-1

USN-8100-1: Linux kernel (NVIDIA) vulnerabilities

Severity
Unknown
Released
Mar 16, 2026
Restart Required
Security Update
SUSE

CVE-2026-23202

CVE-2026-23202

Severity
Unknown
Released
Mar 05, 2026
Security Update

Severity Details

5.5
out of 10.0
Medium

Weakness Type (CWE)

CWE-476 Top 25 #21

NULL Pointer Dereference

Description
The product dereferences a pointer that it expects to be valid but is NULL.
Exploit Likelihood
Medium
Typical Severity
High
Abstraction Level
Base

Key Information

Published Date
February 14, 2026