CVE-2023-53758Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: spi: atmel-quadspi: Free resources even if runtime resume failed in .remove() An early error exit in atmel_qspi_remove() doesn't prevent the device unbind. So this results in an spi controller with an unbound parent and unmapped register space (because devm_ioremap_resource() is undone). So using the remaining spi controller probably results in an oops. Instead unregister the controller unconditionally and only skip hardware

Affected Packages4 packages

Linuxlinux/linux_kernel6.0.06.1.28+2
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linux4a2f83b7f78092a6d9e98fb5573d8f4b79c56336f6974fb20499e3b6522daa7aec822aac11dfcf42+4
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-c2v7-4942-cq2h: In the Linux kernel, the following vulnerability has been resolved: spi: atmel-quadspi: Free resources even if runtime resume failed in2025-12-08
OSV
spi: atmel-quadspi: Free resources even if runtime resume failed in .remove()2025-12-08
OSV
CVE-2023-53758: In the Linux kernel, the following vulnerability has been resolved: spi: atmel-quadspi: Free resources even if runtime resume failed in2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: spi: atmel-quadspi: Free resources even if runtime resume failed in .remove()2025-12-08
Debian
CVE-2023-53758: linux - In the Linux kernel, the following vulnerability has been resolved: spi: atmel-...2023