{"id":"CVE-2026-23207","summary":"spi: tegra210-quad: Protect curr_xfer check in IRQ handler","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer check in IRQ handler\n\nNow that all other accesses to curr_xfer are done under the lock,\nprotect the curr_xfer NULL check in tegra_qspi_isr_thread() with the\nspinlock. Without this protection, the following race can occur:\n\n  CPU0 (ISR thread)              CPU1 (timeout path)\n  ----------------               -------------------\n  if (!tqspi-\u003ecurr_xfer)\n    // sees non-NULL\n                                 spin_lock()\n                                 tqspi-\u003ecurr_xfer = NULL\n                                 spin_unlock()\n  handle_*_xfer()\n    spin_lock()\n    t = tqspi-\u003ecurr_xfer  // NULL!\n    ... t-\u003elen ...        // NULL dereference!\n\nWith this patch, all curr_xfer accesses are now properly synchronized.\n\nAlthough all accesses to curr_xfer are done under the lock, in\ntegra_qspi_isr_thread() it checks for NULL, releases the lock and\nreacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().\nThere is a potential for an update in between, which could cause a NULL\npointer dereference.\n\nTo handle this, add a NULL check inside the handlers after acquiring\nthe lock. This ensures that if the timeout path has already cleared\ncurr_xfer, the handler will safely return without dereferencing the\nNULL pointer.","modified":"2026-04-24T18:29:18.237826430Z","published":"2026-02-14T16:27:29.762Z","related":["CGA-c2wm-3w77-7hvx","SUSE-SU-2026:0962-1","SUSE-SU-2026:1041-1","SUSE-SU-2026:1081-1","SUSE-SU-2026:20667-1","SUSE-SU-2026:20720-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","SUSE-SU-2026:20931-1","SUSE-SU-2026:21114-1","SUSE-SU-2026:21123-1","SUSE-SU-2026:21255-1","openSUSE-SU-2026:20416-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23207.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2ac3a105e51496147c0e44e49466eecfcc532d57"},{"type":"WEB","url":"https://git.kernel.org/stable/c/edf9088b6e1d6d88982db7eb5e736a0e4fbcc09e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23207.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23207"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"01bbf25c767219b14c3235bfa85906b8d2cb8fbc"},{"fixed":"2ac3a105e51496147c0e44e49466eecfcc532d57"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b4e002d8a7cee3b1d70efad0e222567f92a73000"},{"fixed":"edf9088b6e1d6d88982db7eb5e736a0e4fbcc09e"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"88db8bb7ed1bb474618acdf05ebd4f0758d244e2"},{"last_affected":"83309dd551cfd60a5a1a98d9cab19f435b44d46d"},{"last_affected":"c934e40246da2c5726d14e94719c514e30840df8"},{"last_affected":"551060efb156c50fe33799038ba8145418cfdeef"},{"last_affected":"bb0c58be84f907285af45657c1d4847b960a12bf"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23207.json"}}],"schema_version":"1.7.5"}