๐Ÿ” CVE Alert

CVE-2023-53758

UNKNOWN 0.0

spi: atmel-quadspi: Free resources even if runtime resume failed in .remove()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: spi: atmel-quadspi: Free resources even if runtime resume failed in .remove() An early error exit in atmel_qspi_remove() doesn't prevent the device unbind. So this results in an spi controller with an unbound parent and unmapped register space (because devm_ioremap_resource() is undone). So using the remaining spi controller probably results in an oops. Instead unregister the controller unconditionally and only skip hardware access and clk disable. Also add a warning about resume failing and return zero unconditionally. The latter has the only effect to suppress a less helpful error message by the spi core.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 8, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4a2f83b7f78092a6d9e98fb5573d8f4b79c56336 < f6974fb20499e3b6522daa7aec822aac11dfcf42 4a2f83b7f78092a6d9e98fb5573d8f4b79c56336 < 618770d4d8e40b7f8ed9eb5f210cd9164dfac47d 4a2f83b7f78092a6d9e98fb5573d8f4b79c56336 < 77806d7c9bebe40a8cdce2b8d30fbe6511745df8 4a2f83b7f78092a6d9e98fb5573d8f4b79c56336 < 9448bc1dee65f86c0fe64d9dea8b410af0586886
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f6974fb20499e3b6522daa7aec822aac11dfcf42 git.kernel.org: https://git.kernel.org/stable/c/618770d4d8e40b7f8ed9eb5f210cd9164dfac47d git.kernel.org: https://git.kernel.org/stable/c/77806d7c9bebe40a8cdce2b8d30fbe6511745df8 git.kernel.org: https://git.kernel.org/stable/c/9448bc1dee65f86c0fe64d9dea8b410af0586886