In the Linux kernel, the following vulnerability has been resolved:
spi: tegra210-quad: Protect currxfer in tegraqspicombinedseq_xfer
The currxfer field is read by the IRQ handler without holding the lock to check if a transfer is in progress. When clearing currxfer in the combined sequence transfer loop, protect it with the spinlock to prevent a race with the interrupt handler.
Protect the currxfer clearing at the exit path of tegraqspicombinedseq_xfer() with the spinlock to prevent a race with the interrupt handler that reads this field.
Without this protection, the IRQ handler could read a partially updated curr_xfer value, leading to NULL pointer dereference or use-after-free.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23202.json",
"cna_assigner": "Linux"
}