Impact
The flaw stems from a race condition during communication with the tegra210‑quad SPI peripheral. One handler reads a field while another clears it without holding a lock. This can allow the handler to observe an intermediate, potentially null, state and subsequently dereference a NULL pointer or a freed object. The description does not explicitly state the consequences for the system, but it is inferred that the kernel could crash, causing denial of service. The weakness corresponds to CWE‑476.
Affected Systems
Affects the Linux kernel’s tegra210‑quad SPI driver. Versions 6.19 rc1 through rc8 contain the vulnerable code before the lock was added. Any custom kernel build that includes the unchecked tegra_qspi_combined_seq_xfer logic is also affected.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate impact. The EPSS score (<1%) suggests a very low likelihood of an active exploitation vector. It is not listed in CISA KEV. Based on the description, it is inferred that the attack would require local or privileged access to trigger the race condition, so remote exploitation is unlikely. The overall risk remains moderate with a low probability of exploitation, but the denial of service nature warrants attention.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN