CVE-2023-53758 — Linux vulnerability
6 documents5 sources
Severity
—N/A
No vectorEPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Description
In the Linux kernel, the following vulnerability has been resolved:
spi: atmel-quadspi: Free resources even if runtime resume failed in .remove()
An early error exit in atmel_qspi_remove() doesn't prevent the device
unbind. So this results in an spi controller with an unbound parent
and unmapped register space (because devm_ioremap_resource() is undone).
So using the remaining spi controller probably results in an oops.
Instead unregister the controller unconditionally and only skip hardware
…
Affected Packages4 packages
▶CVEListV5linux/linux4a2f83b7f78092a6d9e98fb5573d8f4b79c56336 — f6974fb20499e3b6522daa7aec822aac11dfcf42+4
🔴Vulnerability Details
3GHSA▶
GHSA-c2v7-4942-cq2h: In the Linux kernel, the following vulnerability has been resolved:
spi: atmel-quadspi: Free resources even if runtime resume failed in↗2025-12-08
OSV▶
CVE-2023-53758: In the Linux kernel, the following vulnerability has been resolved: spi: atmel-quadspi: Free resources even if runtime resume failed in↗2025-12-08