๐Ÿ” CVE Alert

CVE-2023-54118

UNKNOWN 0.0

serial: sc16is7xx: setup GPIO controller later in probe

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: serial: sc16is7xx: setup GPIO controller later in probe The GPIO controller component of the sc16is7xx driver is setup too early, which can result in a race condition where another device tries to utilise the GPIO lines before the sc16is7xx device has finished initialising. This issue manifests itself as an Oops when the GPIO lines are configured: Unable to handle kernel read from unreadable memory at virtual address ... pc : sc16is7xx_gpio_direction_output+0x68/0x108 [sc16is7xx] lr : sc16is7xx_gpio_direction_output+0x4c/0x108 [sc16is7xx] ... Call trace: sc16is7xx_gpio_direction_output+0x68/0x108 [sc16is7xx] gpiod_direction_output_raw_commit+0x64/0x318 gpiod_direction_output+0xb0/0x170 create_gpio_led+0xec/0x198 gpio_led_probe+0x16c/0x4f0 platform_drv_probe+0x5c/0xb0 really_probe+0xe8/0x448 driver_probe_device+0xe8/0x138 __device_attach_driver+0x94/0x118 bus_for_each_drv+0x8c/0xe0 __device_attach+0x100/0x1b8 device_initial_probe+0x28/0x38 bus_probe_device+0xa4/0xb0 deferred_probe_work_func+0x90/0xe0 process_one_work+0x1c4/0x480 worker_thread+0x54/0x430 kthread+0x138/0x150 ret_from_fork+0x10/0x1c This patch moves the setup of the GPIO controller functions to later in the probe function, ensuring the sc16is7xx device has already finished initialising by the time other devices try to make use of the GPIO lines. The error handling has also been reordered to reflect the new initialisation order.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
dfeae619d781dee61666d5551b93ba3be755a86b < 17b96b5c19bec791b433890549e44ca523dc82aa dfeae619d781dee61666d5551b93ba3be755a86b < 49b326ce8a686428d8cbb82ed74fc88ed3f95a51 dfeae619d781dee61666d5551b93ba3be755a86b < f57c2164d082a36d177ab7fbf54c18970df89c22 dfeae619d781dee61666d5551b93ba3be755a86b < b71ff206707855ce73c04794c76f7b678b2d4f72 dfeae619d781dee61666d5551b93ba3be755a86b < c8f71b49ee4d28930c4a6798d1969fa91dc4ef3e
Linux / Linux
3.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/17b96b5c19bec791b433890549e44ca523dc82aa git.kernel.org: https://git.kernel.org/stable/c/49b326ce8a686428d8cbb82ed74fc88ed3f95a51 git.kernel.org: https://git.kernel.org/stable/c/f57c2164d082a36d177ab7fbf54c18970df89c22 git.kernel.org: https://git.kernel.org/stable/c/b71ff206707855ce73c04794c76f7b678b2d4f72 git.kernel.org: https://git.kernel.org/stable/c/c8f71b49ee4d28930c4a6798d1969fa91dc4ef3e