CVE-2023-53308 (GCVE-0-2023-53308)
Vulnerability from cvelistv5
Published
2025-09-16 16:11
Modified
2025-09-16 16:11
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: net: fec: Better handle pm_runtime_get() failing in .remove() In the (unlikely) event that pm_runtime_get() (disguised as pm_runtime_resume_and_get()) fails, the remove callback returned an error early. The problem with this is that the driver core ignores the error value and continues removing the device. This results in a resource leak. Worse the devm allocated resources are freed and so if a callback of the driver is called later the register mapping is already gone which probably results in a crash.
Impacted products
Vendor Product Version
Linux Linux Version: 982d424239d7fae74938557428d45c717567ea9b
Version: 04748841f7a02ec6ff07fadfc5d1f8e24e61946d
Version: a31eda65ba210741b598044d045480494d0ed52a
Version: a31eda65ba210741b598044d045480494d0ed52a
Version: a31eda65ba210741b598044d045480494d0ed52a
Version: a31eda65ba210741b598044d045480494d0ed52a
Version: a31eda65ba210741b598044d045480494d0ed52a
Version: a31eda65ba210741b598044d045480494d0ed52a
Version: d961a58dcc9778948502847303d29d018a49710a
Version: d9c7531fb4708eb3f22cccdb0b7371834d37555a
Create a notification for this product.
   Linux Linux Version: 5.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/freescale/fec_main.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "d52a0cca591e899d4e5c8ab19e067b4c6b7d104f",
              "status": "affected",
              "version": "982d424239d7fae74938557428d45c717567ea9b",
              "versionType": "git"
            },
            {
              "lessThan": "be85912c36ddca3e8b2eef1b5392cd8db6bdb730",
              "status": "affected",
              "version": "04748841f7a02ec6ff07fadfc5d1f8e24e61946d",
              "versionType": "git"
            },
            {
              "lessThan": "b22b514209ff8c4287abb853399890ab97e1b5ca",
              "status": "affected",
              "version": "a31eda65ba210741b598044d045480494d0ed52a",
              "versionType": "git"
            },
            {
              "lessThan": "83996d317b1deddc85006376082e8886f55aa709",
              "status": "affected",
              "version": "a31eda65ba210741b598044d045480494d0ed52a",
              "versionType": "git"
            },
            {
              "lessThan": "c1bc2870f14e526a01897e14c747a0a0ca125231",
              "status": "affected",
              "version": "a31eda65ba210741b598044d045480494d0ed52a",
              "versionType": "git"
            },
            {
              "lessThan": "9407454a9b18bbeff216e8ecde87ffb2171e9ccf",
              "status": "affected",
              "version": "a31eda65ba210741b598044d045480494d0ed52a",
              "versionType": "git"
            },
            {
              "lessThan": "e02d8d5b1602689b98d9b91550a11b9b57baedbe",
              "status": "affected",
              "version": "a31eda65ba210741b598044d045480494d0ed52a",
              "versionType": "git"
            },
            {
              "lessThan": "f816b9829b19394d318e01953aa3b2721bca040d",
              "status": "affected",
              "version": "a31eda65ba210741b598044d045480494d0ed52a",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "d961a58dcc9778948502847303d29d018a49710a",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "d9c7531fb4708eb3f22cccdb0b7371834d37555a",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/freescale/fec_main.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.4"
            },
            {
              "lessThan": "5.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.316",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.284",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.244",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.181",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.113",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.30",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.3.*",
              "status": "unaffected",
              "version": "6.3.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.4",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.316",
                  "versionStartIncluding": "4.14.158",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.284",
                  "versionStartIncluding": "4.19.88",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.244",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.181",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.113",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.30",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.3.4",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.4",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.206",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.3.15",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fec: Better handle pm_runtime_get() failing in .remove()\n\nIn the (unlikely) event that pm_runtime_get() (disguised as\npm_runtime_resume_and_get()) fails, the remove callback returned an\nerror early. The problem with this is that the driver core ignores the\nerror value and continues removing the device. This results in a\nresource leak. Worse the devm allocated resources are freed and so if a\ncallback of the driver is called later the register mapping is already\ngone which probably results in a crash."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-16T16:11:46.998Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/d52a0cca591e899d4e5c8ab19e067b4c6b7d104f"
        },
        {
          "url": "https://git.kernel.org/stable/c/be85912c36ddca3e8b2eef1b5392cd8db6bdb730"
        },
        {
          "url": "https://git.kernel.org/stable/c/b22b514209ff8c4287abb853399890ab97e1b5ca"
        },
        {
          "url": "https://git.kernel.org/stable/c/83996d317b1deddc85006376082e8886f55aa709"
        },
        {
          "url": "https://git.kernel.org/stable/c/c1bc2870f14e526a01897e14c747a0a0ca125231"
        },
        {
          "url": "https://git.kernel.org/stable/c/9407454a9b18bbeff216e8ecde87ffb2171e9ccf"
        },
        {
          "url": "https://git.kernel.org/stable/c/e02d8d5b1602689b98d9b91550a11b9b57baedbe"
        },
        {
          "url": "https://git.kernel.org/stable/c/f816b9829b19394d318e01953aa3b2721bca040d"
        }
      ],
      "title": "net: fec: Better handle pm_runtime_get() failing in .remove()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53308",
    "datePublished": "2025-09-16T16:11:46.998Z",
    "dateReserved": "2025-09-16T16:08:59.561Z",
    "dateUpdated": "2025-09-16T16:11:46.998Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-53308\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-16T17:15:36.597\",\"lastModified\":\"2025-09-17T14:18:55.093\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: fec: Better handle pm_runtime_get() failing in .remove()\\n\\nIn the (unlikely) event that pm_runtime_get() (disguised as\\npm_runtime_resume_and_get()) fails, the remove callback returned an\\nerror early. The problem with this is that the driver core ignores the\\nerror value and continues removing the device. This results in a\\nresource leak. Worse the devm allocated resources are freed and so if a\\ncallback of the driver is called later the register mapping is already\\ngone which probably results in a crash.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/83996d317b1deddc85006376082e8886f55aa709\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9407454a9b18bbeff216e8ecde87ffb2171e9ccf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b22b514209ff8c4287abb853399890ab97e1b5ca\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/be85912c36ddca3e8b2eef1b5392cd8db6bdb730\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c1bc2870f14e526a01897e14c747a0a0ca125231\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d52a0cca591e899d4e5c8ab19e067b4c6b7d104f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e02d8d5b1602689b98d9b91550a11b9b57baedbe\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f816b9829b19394d318e01953aa3b2721bca040d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…