Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Linux Kernel: Tegra SPI Driver Allows Data Corruption or Crashes

UBUNTU-CVE-2026-23202
Summary

The Linux kernel's Tegra SPI driver has a security issue that could cause data corruption or crashes. If left unpatched, this vulnerability could allow an attacker to access or delete sensitive data. We recommend that Linux users install the latest kernel updates to fix this issue.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
canonical linux-hwe-edge All versions
canonical linux-aws-5.0 All versions
canonical linux-aws-5.3 All versions
canonical linux-azure All versions
canonical linux-azure-5.3 All versions
canonical linux-azure-edge All versions
canonical linux-gcp All versions
canonical linux-gcp-5.3 All versions
canonical linux-gke-4.15 All versions
canonical linux-gke-5.4 All versions
canonical linux-gkeop-5.4 All versions
canonical linux-hwe All versions
canonical linux-hwe-edge All versions
canonical linux-oem All versions
canonical linux-oracle-5.0 All versions
canonical linux-oracle-5.3 All versions
canonical linux-aws-5.11 All versions
canonical linux-aws-5.13 All versions
canonical linux-aws-5.8 All versions
canonical linux-azure-5.11 All versions
canonical linux-azure-5.13 All versions
canonical linux-azure-5.8 All versions
canonical linux-azure-fde All versions
canonical linux-gcp-5.11 All versions
canonical linux-gcp-5.13 All versions
canonical linux-gcp-5.8 All versions
canonical linux-gke All versions
canonical linux-gke-5.15 All versions
canonical linux-gkeop All versions
canonical linux-gkeop-5.15 All versions
canonical linux-hwe-5.11 All versions
canonical linux-hwe-5.13 All versions
canonical linux-hwe-5.15 All versions
canonical linux-hwe-5.8 All versions
canonical linux-intel-5.13 All versions
canonical linux-lowlatency-hwe-5.15 All versions
canonical linux-oem-5.10 All versions
canonical linux-oem-5.13 All versions
canonical linux-oem-5.14 All versions
canonical linux-oem-5.6 All versions
canonical linux-oracle-5.11 All versions
canonical linux-oracle-5.13 All versions
canonical linux-oracle-5.8 All versions
canonical linux-raspi2 All versions
canonical linux-riscv All versions
canonical linux-riscv-5.11 All versions
canonical linux-riscv-5.8 All versions
canonical linux All versions
canonical linux-allwinner-5.19 All versions
canonical linux-aws-5.19 All versions
canonical linux-aws-6.2 All versions
canonical linux-aws-6.5 All versions
canonical linux-azure All versions
canonical linux-azure-5.19 All versions
canonical linux-azure-6.2 All versions
canonical linux-azure-6.5 All versions
canonical linux-azure-fde All versions
canonical linux-azure-fde-5.19 All versions
canonical linux-azure-fde-6.2 All versions
canonical linux-gcp All versions
canonical linux-gcp-5.19 All versions
canonical linux-gcp-6.2 All versions
canonical linux-gcp-6.5 All versions
canonical linux-gkeop All versions
canonical linux-hwe-5.19 All versions
canonical linux-hwe-6.2 All versions
canonical linux-hwe-6.5 All versions
canonical linux-ibm All versions
canonical linux-intel-iot-realtime All versions
canonical linux-intel-iotg All versions
canonical linux-lowlatency All versions
canonical linux-lowlatency-hwe-5.19 All versions
canonical linux-lowlatency-hwe-6.2 All versions
canonical linux-lowlatency-hwe-6.5 All versions
canonical linux-nvidia-6.2 All versions
canonical linux-nvidia-6.5 All versions
canonical linux-nvidia-6.8 All versions
canonical linux-oem-5.17 All versions
canonical linux-oem-6.0 All versions
canonical linux-oem-6.1 All versions
canonical linux-oem-6.5 All versions
canonical linux-oracle-6.5 All versions
canonical linux-raspi All versions
canonical linux-realtime All versions
canonical linux-riscv All versions
canonical linux-riscv-5.19 All versions
canonical linux-riscv-6.5 All versions
canonical linux-starfive-5.19 All versions
canonical linux-starfive-6.2 All versions
canonical linux-starfive-6.5 All versions
canonical linux-azure-fips All versions
canonical linux-azure-6.11 All versions
canonical linux-azure-nvidia All versions
canonical linux-gcp-6.11 All versions
canonical linux-gcp-6.17 All versions
canonical linux-hwe-6.11 All versions
canonical linux-hwe-6.17 All versions
canonical linux-lowlatency-hwe-6.11 All versions
canonical linux-nvidia All versions
canonical linux-nvidia-6.11 All versions
canonical linux-nvidia-lowlatency All versions
canonical linux-nvidia-tegra All versions
canonical linux-oem-6.11 All versions
canonical linux-oem-6.8 All versions
canonical linux-oracle-6.14 All versions
canonical linux-raspi-realtime All versions
canonical linux-realtime All versions
canonical linux-riscv All versions
canonical linux-riscv-6.14 All versions
canonical linux-riscv-6.17 All versions
canonical linux-realtime-6.14 All versions
canonical linux All versions
canonical linux-gcp All versions
canonical linux-raspi All versions
canonical linux-riscv All versions
Original title
In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer The curr_xfer field is read by the IRQ handler without hold...
Original description
In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer The curr_xfer field is read by the IRQ handler without holding the lock to check if a transfer is in progress. When clearing curr_xfer in the combined sequence transfer loop, protect it with the spinlock to prevent a race with the interrupt handler. Protect the curr_xfer clearing at the exit path of tegra_qspi_combined_seq_xfer() with the spinlock to prevent a race with the interrupt handler that reads this field. Without this protection, the IRQ handler could read a partially updated curr_xfer value, leading to NULL pointer dereference or use-after-free.
Published: 14 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026