-

CVE-2023-53443

In the Linux kernel, the following vulnerability has been resolved:

mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak

In arizona_clk32k_enable(), we should use pm_runtime_resume_and_get()
as pm_runtime_get_sync() will increase the refcnt even when it
returns an error.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 7195e642b49af60d4120fa1b45bd812ba528174f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 754e81ff44061dda68da0fd4ef51bd1aa9fbf2cf
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 5a47bb71b1a94a279144fc3031d3c4591b38dd16
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 9893771097b22a8743a446e45994a177795ca4da
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < dc9437e9889c3dacf1f320e3cf08da74127573fe
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 4414a7ab80cebf715045e3c4d465feefbad21139
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.235
Status unaffected
Version <= 5.10.*
Version 5.10.173
Status unaffected
Version <= 5.15.*
Version 5.15.100
Status unaffected
Version <= 6.1.*
Version 6.1.18
Status unaffected
Version <= 6.2.*
Version 6.2.5
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string