-

CVE-2023-53567

In the Linux kernel, the following vulnerability has been resolved:

spi: qup: Don't skip cleanup in remove's error path

Returning early in a platform driver's remove callback is wrong. In this
case the dma resources are not released in the error path. this is never
retried later and so this is a permanent leak. To fix this, only skip
hardware disabling if waking the device fails.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < fd53f41bd86daa39b454fd4637a908ff2123547f
Version 64ff247a978facc437d40f0c9b754675846a98f0
Status affected
Version < 8632384337038b97910c2f7bb5a3f377aa68d001
Version 64ff247a978facc437d40f0c9b754675846a98f0
Status affected
Version < bc88243bbe6140d289bb32b4ee4607ba5ce1124a
Version 64ff247a978facc437d40f0c9b754675846a98f0
Status affected
Version < f345d4d71e87d878437417ffbb9a7d4e16d235eb
Version 64ff247a978facc437d40f0c9b754675846a98f0
Status affected
Version < 2d0f63077f481f11a07f20eab1c1f4367dfaef32
Version 64ff247a978facc437d40f0c9b754675846a98f0
Status affected
Version < 55ecdcd12bc176b86fecbcb125ac814ac8fe857a
Version 64ff247a978facc437d40f0c9b754675846a98f0
Status affected
Version < 49c17fccae36505550c9121891722fff337f148a
Version 64ff247a978facc437d40f0c9b754675846a98f0
Status affected
Version < 61f49171a43ab1f80c73c5c88c508770c461e0f2
Version 64ff247a978facc437d40f0c9b754675846a98f0
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.15
Status affected
Version < 3.15
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.283
Status unaffected
Version <= 5.4.*
Version 5.4.243
Status unaffected
Version <= 5.10.*
Version 5.10.180
Status unaffected
Version <= 5.15.*
Version 5.15.111
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.053
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string