Home

Description

In the Linux kernel, the following vulnerability has been resolved: spi: atmel-quadspi: Free resources even if runtime resume failed in .remove() An early error exit in atmel_qspi_remove() doesn't prevent the device unbind. So this results in an spi controller with an unbound parent and unmapped register space (because devm_ioremap_resource() is undone). So using the remaining spi controller probably results in an oops. Instead unregister the controller unconditionally and only skip hardware access and clk disable. Also add a warning about resume failing and return zero unconditionally. The latter has the only effect to suppress a less helpful error message by the spi core.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-08 | Updated 2025-12-08 | Assigner Linux

Product status

Default status
unaffected

4a2f83b7f78092a6d9e98fb5573d8f4b79c56336 (git) before f6974fb20499e3b6522daa7aec822aac11dfcf42
affected

4a2f83b7f78092a6d9e98fb5573d8f4b79c56336 (git) before 618770d4d8e40b7f8ed9eb5f210cd9164dfac47d
affected

4a2f83b7f78092a6d9e98fb5573d8f4b79c56336 (git) before 77806d7c9bebe40a8cdce2b8d30fbe6511745df8
affected

4a2f83b7f78092a6d9e98fb5573d8f4b79c56336 (git) before 9448bc1dee65f86c0fe64d9dea8b410af0586886
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.1.28 (semver)
unaffected

6.2.15 (semver)
unaffected

6.3.2 (semver)
unaffected

6.4 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/f6974fb20499e3b6522daa7aec822aac11dfcf42

git.kernel.org/...c/618770d4d8e40b7f8ed9eb5f210cd9164dfac47d

git.kernel.org/...c/77806d7c9bebe40a8cdce2b8d30fbe6511745df8

git.kernel.org/...c/9448bc1dee65f86c0fe64d9dea8b410af0586886

cve.org (CVE-2023-53758)

nvd.nist.gov (CVE-2023-53758)

Download JSON