-

CVE-2023-53308

In the Linux kernel, the following vulnerability has been resolved:

net: fec: Better handle pm_runtime_get() failing in .remove()

In the (unlikely) event that pm_runtime_get() (disguised as
pm_runtime_resume_and_get()) fails, the remove callback returned an
error early. The problem with this is that the driver core ignores the
error value and continues removing the device. This results in a
resource leak. Worse the devm allocated resources are freed and so if a
callback of the driver is called later the register mapping is already
gone which probably results in a crash.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < d52a0cca591e899d4e5c8ab19e067b4c6b7d104f
Version 982d424239d7fae74938557428d45c717567ea9b
Status affected
Version < be85912c36ddca3e8b2eef1b5392cd8db6bdb730
Version 04748841f7a02ec6ff07fadfc5d1f8e24e61946d
Status affected
Version < b22b514209ff8c4287abb853399890ab97e1b5ca
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version < 83996d317b1deddc85006376082e8886f55aa709
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version < c1bc2870f14e526a01897e14c747a0a0ca125231
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version < 9407454a9b18bbeff216e8ecde87ffb2171e9ccf
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version < e02d8d5b1602689b98d9b91550a11b9b57baedbe
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version < f816b9829b19394d318e01953aa3b2721bca040d
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version d961a58dcc9778948502847303d29d018a49710a
Status affected
Version d9c7531fb4708eb3f22cccdb0b7371834d37555a
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.4
Status affected
Version < 5.4
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.316
Status unaffected
Version <= 4.19.*
Version 4.19.284
Status unaffected
Version <= 5.4.*
Version 5.4.244
Status unaffected
Version <= 5.10.*
Version 5.10.181
Status unaffected
Version <= 5.15.*
Version 5.15.113
Status unaffected
Version <= 6.1.*
Version 6.1.30
Status unaffected
Version <= 6.3.*
Version 6.3.4
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string