-
CVE-2023-53308
- EPSS 0.03%
- Veröffentlicht 16.09.2025 16:11:46
- Zuletzt bearbeitet 17.09.2025 14:18:55
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: net: fec: Better handle pm_runtime_get() failing in .remove() In the (unlikely) event that pm_runtime_get() (disguised as pm_runtime_resume_and_get()) fails, the remove callback returned an error early. The problem with this is that the driver core ignores the error value and continues removing the device. This results in a resource leak. Worse the devm allocated resources are freed and so if a callback of the driver is called later the register mapping is already gone which probably results in a crash.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
d52a0cca591e899d4e5c8ab19e067b4c6b7d104f
Version
982d424239d7fae74938557428d45c717567ea9b
Status
affected
Version <
be85912c36ddca3e8b2eef1b5392cd8db6bdb730
Version
04748841f7a02ec6ff07fadfc5d1f8e24e61946d
Status
affected
Version <
b22b514209ff8c4287abb853399890ab97e1b5ca
Version
a31eda65ba210741b598044d045480494d0ed52a
Status
affected
Version <
83996d317b1deddc85006376082e8886f55aa709
Version
a31eda65ba210741b598044d045480494d0ed52a
Status
affected
Version <
c1bc2870f14e526a01897e14c747a0a0ca125231
Version
a31eda65ba210741b598044d045480494d0ed52a
Status
affected
Version <
9407454a9b18bbeff216e8ecde87ffb2171e9ccf
Version
a31eda65ba210741b598044d045480494d0ed52a
Status
affected
Version <
e02d8d5b1602689b98d9b91550a11b9b57baedbe
Version
a31eda65ba210741b598044d045480494d0ed52a
Status
affected
Version <
f816b9829b19394d318e01953aa3b2721bca040d
Version
a31eda65ba210741b598044d045480494d0ed52a
Status
affected
Version
d961a58dcc9778948502847303d29d018a49710a
Status
affected
Version
d9c7531fb4708eb3f22cccdb0b7371834d37555a
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.4
Status
affected
Version <
5.4
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.316
Status
unaffected
Version <=
4.19.*
Version
4.19.284
Status
unaffected
Version <=
5.4.*
Version
5.4.244
Status
unaffected
Version <=
5.10.*
Version
5.10.181
Status
unaffected
Version <=
5.15.*
Version
5.15.113
Status
unaffected
Version <=
6.1.*
Version
6.1.30
Status
unaffected
Version <=
6.3.*
Version
6.3.4
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|