-

CVE-2023-53308

In the Linux kernel, the following vulnerability has been resolved:

net: fec: Better handle pm_runtime_get() failing in .remove()

In the (unlikely) event that pm_runtime_get() (disguised as
pm_runtime_resume_and_get()) fails, the remove callback returned an
error early. The problem with this is that the driver core ignores the
error value and continues removing the device. This results in a
resource leak. Worse the devm allocated resources are freed and so if a
callback of the driver is called later the register mapping is already
gone which probably results in a crash.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < d52a0cca591e899d4e5c8ab19e067b4c6b7d104f
Version 982d424239d7fae74938557428d45c717567ea9b
Status affected
Version < be85912c36ddca3e8b2eef1b5392cd8db6bdb730
Version 04748841f7a02ec6ff07fadfc5d1f8e24e61946d
Status affected
Version < b22b514209ff8c4287abb853399890ab97e1b5ca
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version < 83996d317b1deddc85006376082e8886f55aa709
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version < c1bc2870f14e526a01897e14c747a0a0ca125231
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version < 9407454a9b18bbeff216e8ecde87ffb2171e9ccf
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version < e02d8d5b1602689b98d9b91550a11b9b57baedbe
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version < f816b9829b19394d318e01953aa3b2721bca040d
Version a31eda65ba210741b598044d045480494d0ed52a
Status affected
Version d961a58dcc9778948502847303d29d018a49710a
Status affected
Version d9c7531fb4708eb3f22cccdb0b7371834d37555a
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.4
Status affected
Version < 5.4
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.316
Status unaffected
Version <= 4.19.*
Version 4.19.284
Status unaffected
Version <= 5.4.*
Version 5.4.244
Status unaffected
Version <= 5.10.*
Version 5.10.181
Status unaffected
Version <= 5.15.*
Version 5.15.113
Status unaffected
Version <= 6.1.*
Version 6.1.30
Status unaffected
Version <= 6.3.*
Version 6.3.4
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String