In the Linux kernel, the following vulnerability has been resolved:
crypto: safexcel - Cleanup ring IRQ workqueues on load failure
A failure loading the safexcel driver results in the following warning on boot, because the IRQ affinity has not been correctly cleaned up. Ensure we clean up the affinity and workqueues on a failure to load the driver.
crypto-safexcel: probe of f2800000.crypto failed with error -2 ------------[ cut here ]------------ WARNING: CPU: 1 PID: 232 at kernel/irq/manage.c:1913 freeirq+0x300/0x340 Modules linked in: hwmon mdioi2c cryptosafexcel(+) md5 sha256generic libsha256 authenc libdes omaprng rngcore nftmasq nftnat nftchainnat nfnat nftct nfconntrack nfdefragipv6 nfdefragipv4 nftables libcrc32c nfnetlink fuse autofs4 CPU: 1 PID: 232 Comm: systemd-udevd Tainted: G W 6.1.6-00002-g9d4898824677 #3 Hardware name: MikroTik RB5009 (DT) pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : freeirq+0x300/0x340 lr : freeirq+0x2e0/0x340 sp : ffff800008fa3890 x29: ffff800008fa3890 x28: 0000000000000000 x27: 0000000000000000 x26: ffff8000008e6dc0 x25: ffff000009034cac x24: ffff000009034d50 x23: 0000000000000000 x22: 000000000000004a x21: ffff0000093e0d80 x20: ffff000009034c00 x19: ffff00000615fc00 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 000075f5c1584c5e x14: 0000000000000017 x13: 0000000000000000 x12: 0000000000000040 x11: ffff000000579b60 x10: ffff000000579b62 x9 : ffff800008bbe370 x8 : ffff000000579dd0 x7 : 0000000000000000 x6 : ffff000000579e18 x5 : ffff000000579da8 x4 : ffff800008ca0000 x3 : ffff800008ca0188 x2 : 0000000013033204 x1 : ffff000009034c00 x0 : ffff8000087eadf0 Call trace: freeirq+0x300/0x340 devmirqrelease+0x14/0x20 devresreleaseall+0xa0/0x100 deviceunbindcleanup+0x14/0x60 reallyprobe+0x198/0x2d4 _driverprobedevice+0x74/0xdc driverprobedevice+0x3c/0x110 _driverattach+0x8c/0x190 busforeachdev+0x6c/0xc0 driverattach+0x20/0x30 busadddriver+0x148/0x1fc driverregister+0x74/0x120 _platformdriverregister+0x24/0x30 safexcelinit+0x48/0x1000 [cryptosafexcel] dooneinitcall+0x4c/0x1b0 doinitmodule+0x44/0x1cc loadmodule+0x1724/0x1be4 _dosysfinitmodule+0xbc/0x110 _arm64sysfinitmodule+0x1c/0x24 invokesyscall+0x44/0x110 el0svccommon.constprop.0+0xc0/0xe0 doel0svc+0x20/0x80 el0svc+0x14/0x4c el0t64synchandler+0xb0/0xb4 el0t64_sync+0x148/0x14c ---[ end trace 0000000000000000 ]---
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54126.json",
"cna_assigner": "Linux"
}