-

CVE-2023-53758

In the Linux kernel, the following vulnerability has been resolved:

spi: atmel-quadspi: Free resources even if runtime resume failed in .remove()

An early error exit in atmel_qspi_remove() doesn't prevent the device
unbind. So this results in an spi controller with an unbound parent
and unmapped register space (because devm_ioremap_resource() is undone).
So using the remaining spi controller probably results in an oops.

Instead unregister the controller unconditionally and only skip hardware
access and clk disable.

Also add a warning about resume failing and return zero unconditionally.
The latter has the only effect to suppress a less helpful error message by
the spi core.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < f6974fb20499e3b6522daa7aec822aac11dfcf42
Version 4a2f83b7f78092a6d9e98fb5573d8f4b79c56336
Status affected
Version < 618770d4d8e40b7f8ed9eb5f210cd9164dfac47d
Version 4a2f83b7f78092a6d9e98fb5573d8f4b79c56336
Status affected
Version < 77806d7c9bebe40a8cdce2b8d30fbe6511745df8
Version 4a2f83b7f78092a6d9e98fb5573d8f4b79c56336
Status affected
Version < 9448bc1dee65f86c0fe64d9dea8b410af0586886
Version 4a2f83b7f78092a6d9e98fb5573d8f4b79c56336
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.0
Status affected
Version < 6.0
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.036
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String