CVE-2026-23182
📋 TL;DR
A memory leak vulnerability in the Linux kernel's Tegra SPI driver occurs when platform_get_irq() fails during device probe, causing allocated resources to not be properly freed. This affects systems using NVIDIA Tegra processors with the affected SPI driver. The vulnerability could lead to resource exhaustion over time.
💻 Affected Systems
- Linux kernel with Tegra SPI driver
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Continuous exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or potential kernel panic.
Likely Case
Memory leak during device initialization failures, gradually consuming kernel memory until system becomes unstable or requires reboot.
If Mitigated
Minimal impact with proper monitoring and regular reboots; memory leak only occurs during specific initialization failures.
🎯 Exploit Status
Exploitation requires ability to trigger IRQ allocation failure during SPI device initialization; not a typical remote attack vector.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing the fix commits referenced in CVE
Vendor Advisory: https://git.kernel.org/stable/c/075415ae18b5b3e4d0187962d538653154216fe7
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing fix commits 2. Rebuild kernel if using custom kernel 3. Reboot system to load patched kernel
🔧 Temporary Workarounds
Disable Tegra SPI driver
LinuxPrevent loading of vulnerable driver module
echo 'blacklist spi-tegra' >> /etc/modprobe.d/blacklist.conf
rmmod spi_tegra
🧯 If You Can't Patch
- Monitor kernel memory usage for unusual increases
- Implement regular system reboots to clear accumulated memory leaks
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if Tegra SPI driver is loaded: lsmod | grep spi_tegra && uname -r
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched and driver loads without errors in dmesg
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- Memory allocation failures in dmesg
- SPI driver initialization errors
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("spi-tegra" OR "tegra_slink") AND ("memory" OR "leak" OR "allocation failure")
🔗 References
- https://git.kernel.org/stable/c/075415ae18b5b3e4d0187962d538653154216fe7
- https://git.kernel.org/stable/c/126a09f4fcd2b895a818ca43fde078d907c1ac9a
- https://git.kernel.org/stable/c/327b71326cc1834bc031e8f52a470a18dfd9caa6
- https://git.kernel.org/stable/c/41d9a6795b95d6ea28439ac1e9ce8c95bbca20fc
- https://git.kernel.org/stable/c/6a04dc650cef8d52a1ccb4ae245dbe318ffff32e
- https://git.kernel.org/stable/c/b8eec12aa666c11f8a6ad1488c568f85c58875fa