CVE-2023-53308
16.09.2025, 17:15
In the Linux kernel, the following vulnerability has been resolved: net: fec: Better handle pm_runtime_get() failing in .remove() In the (unlikely) event that pm_runtime_get() (disguised as pm_runtime_resume_and_get()) fails, the remove callback returned an error early. The problem with this is that the driver core ignores the error value and continues removing the device. This results in a resource leak. Worse the devm allocated resources are freed and so if a callback of the driver is called later the register mapping is already gone which probably results in a crash.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.9.206 ≤ 𝑥 < 4.10 |
| linux | linux_kernel | 4.14.158 ≤ 𝑥 < 4.14.316 |
| linux | linux_kernel | 4.19.88 ≤ 𝑥 < 4.19.284 |
| linux | linux_kernel | 5.3.15 ≤ 𝑥 < 5.4 |
| linux | linux_kernel | 5.4.1 ≤ 𝑥 < 5.4.244 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.181 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.113 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.30 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.3.4 |
| linux | linux_kernel | 5.4 |
| linux | linux_kernel | 6.4:rc1 |
| linux | linux_kernel | 6.4:rc2 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
Vulnerability Media Exposure
References