Linux Kernel TEGRA210 QSPI curr_xfer race causes NULL deref
CVE-2026-23207 Published on February 14, 2026
spi: tegra210-quad: Protect curr_xfer check in IRQ handler
In the Linux kernel, the following vulnerability has been resolved:
spi: tegra210-quad: Protect curr_xfer check in IRQ handler
Now that all other accesses to curr_xfer are done under the lock,
protect the curr_xfer NULL check in tegra_qspi_isr_thread() with the
spinlock. Without this protection, the following race can occur:
CPU0 (ISR thread) CPU1 (timeout path)
---------------- -------------------
if (!tqspi->curr_xfer)
// sees non-NULL
spin_lock()
tqspi->curr_xfer = NULL
spin_unlock()
handle_*_xfer()
spin_lock()
t = tqspi->curr_xfer // NULL!
... t->len ... // NULL dereference!
With this patch, all curr_xfer accesses are now properly synchronized.
Although all accesses to curr_xfer are done under the lock, in
tegra_qspi_isr_thread() it checks for NULL, releases the lock and
reacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().
There is a potential for an update in between, which could cause a NULL
pointer dereference.
To handle this, add a NULL check inside the handlers after acquiring
the lock. This ensures that if the timeout path has already cleared
curr_xfer, the handler will safely return without dereferencing the
NULL pointer.
Products Associated with CVE-2026-23207
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2026-23207 are published in Linux Kernel:
Affected Versions
Linux:- Version 01bbf25c767219b14c3235bfa85906b8d2cb8fbc and below 2ac3a105e51496147c0e44e49466eecfcc532d57 is affected.
- Version b4e002d8a7cee3b1d70efad0e222567f92a73000 and below edf9088b6e1d6d88982db7eb5e736a0e4fbcc09e is affected.
- Version 88db8bb7ed1bb474618acdf05ebd4f0758d244e2 is affected.
- Version 83309dd551cfd60a5a1a98d9cab19f435b44d46d is affected.
- Version c934e40246da2c5726d14e94719c514e30840df8 is affected.
- Version 551060efb156c50fe33799038ba8145418cfdeef is affected.
- Version bb0c58be84f907285af45657c1d4847b960a12bf is affected.
- Version 6.18.2 and below 6.18.10 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.