CVE-2023-53225
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
15/09/2025
Última modificación:
15/09/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
spi: imx: Don&#39;t skip cleanup in remove&#39;s error path<br />
<br />
Returning early in a platform driver&#39;s remove callback is wrong. In this<br />
case the dma resources are not released in the error path. this is never<br />
retried later and so this is a permanent leak. To fix this, only skip<br />
hardware disabling if waking the device fails.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/11951c9e3f364d7ae3b568a0e52c8335d43066b5
- https://git.kernel.org/stable/c/57a463226638f1ceabbb029cbd21b0c94640f1b5
- https://git.kernel.org/stable/c/6d16305a1535873e0a8a8ae92ea2d9106ec2d7df
- https://git.kernel.org/stable/c/aa93a46f998a9069368026ac52bba96868c59157
- https://git.kernel.org/stable/c/b64cb3f085fed296103c91f0db6acad30a021b36
- https://git.kernel.org/stable/c/f90822ad63d11301e425311dac0c8e12ca1737b8



