CVE-2023-53308 (GCVE-0-2023-53308)
Vulnerability from cvelistv5
Published
2025-09-16 16:11
Modified
2025-09-16 16:11
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
net: fec: Better handle pm_runtime_get() failing in .remove()
In the (unlikely) event that pm_runtime_get() (disguised as
pm_runtime_resume_and_get()) fails, the remove callback returned an
error early. The problem with this is that the driver core ignores the
error value and continues removing the device. This results in a
resource leak. Worse the devm allocated resources are freed and so if a
callback of the driver is called later the register mapping is already
gone which probably results in a crash.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Linux | Linux |
Version: 982d424239d7fae74938557428d45c717567ea9b Version: 04748841f7a02ec6ff07fadfc5d1f8e24e61946d Version: a31eda65ba210741b598044d045480494d0ed52a Version: a31eda65ba210741b598044d045480494d0ed52a Version: a31eda65ba210741b598044d045480494d0ed52a Version: a31eda65ba210741b598044d045480494d0ed52a Version: a31eda65ba210741b598044d045480494d0ed52a Version: a31eda65ba210741b598044d045480494d0ed52a Version: d961a58dcc9778948502847303d29d018a49710a Version: d9c7531fb4708eb3f22cccdb0b7371834d37555a |
||||||
|
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/freescale/fec_main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "d52a0cca591e899d4e5c8ab19e067b4c6b7d104f", "status": "affected", "version": "982d424239d7fae74938557428d45c717567ea9b", "versionType": "git" }, { "lessThan": "be85912c36ddca3e8b2eef1b5392cd8db6bdb730", "status": "affected", "version": "04748841f7a02ec6ff07fadfc5d1f8e24e61946d", "versionType": "git" }, { "lessThan": "b22b514209ff8c4287abb853399890ab97e1b5ca", "status": "affected", "version": "a31eda65ba210741b598044d045480494d0ed52a", "versionType": "git" }, { "lessThan": "83996d317b1deddc85006376082e8886f55aa709", "status": "affected", "version": "a31eda65ba210741b598044d045480494d0ed52a", "versionType": "git" }, { "lessThan": "c1bc2870f14e526a01897e14c747a0a0ca125231", "status": "affected", "version": "a31eda65ba210741b598044d045480494d0ed52a", "versionType": "git" }, { "lessThan": "9407454a9b18bbeff216e8ecde87ffb2171e9ccf", "status": "affected", "version": "a31eda65ba210741b598044d045480494d0ed52a", "versionType": "git" }, { "lessThan": "e02d8d5b1602689b98d9b91550a11b9b57baedbe", "status": "affected", "version": "a31eda65ba210741b598044d045480494d0ed52a", "versionType": "git" }, { "lessThan": "f816b9829b19394d318e01953aa3b2721bca040d", "status": "affected", "version": "a31eda65ba210741b598044d045480494d0ed52a", "versionType": "git" }, { "status": "affected", "version": "d961a58dcc9778948502847303d29d018a49710a", "versionType": "git" }, { "status": "affected", "version": "d9c7531fb4708eb3f22cccdb0b7371834d37555a", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/ethernet/freescale/fec_main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.4" }, { "lessThan": "5.4", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.14.*", "status": "unaffected", "version": "4.14.316", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.284", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.244", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.181", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.113", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.30", "versionType": "semver" }, { "lessThanOrEqual": "6.3.*", "status": "unaffected", "version": "6.3.4", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.4", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.14.316", "versionStartIncluding": "4.14.158", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.19.284", "versionStartIncluding": "4.19.88", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.4.244", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.181", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.113", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.30", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.3.4", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.4", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.9.206", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.3.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fec: Better handle pm_runtime_get() failing in .remove()\n\nIn the (unlikely) event that pm_runtime_get() (disguised as\npm_runtime_resume_and_get()) fails, the remove callback returned an\nerror early. The problem with this is that the driver core ignores the\nerror value and continues removing the device. This results in a\nresource leak. Worse the devm allocated resources are freed and so if a\ncallback of the driver is called later the register mapping is already\ngone which probably results in a crash." } ], "providerMetadata": { "dateUpdated": "2025-09-16T16:11:46.998Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/d52a0cca591e899d4e5c8ab19e067b4c6b7d104f" }, { "url": "https://git.kernel.org/stable/c/be85912c36ddca3e8b2eef1b5392cd8db6bdb730" }, { "url": "https://git.kernel.org/stable/c/b22b514209ff8c4287abb853399890ab97e1b5ca" }, { "url": "https://git.kernel.org/stable/c/83996d317b1deddc85006376082e8886f55aa709" }, { "url": "https://git.kernel.org/stable/c/c1bc2870f14e526a01897e14c747a0a0ca125231" }, { "url": "https://git.kernel.org/stable/c/9407454a9b18bbeff216e8ecde87ffb2171e9ccf" }, { "url": "https://git.kernel.org/stable/c/e02d8d5b1602689b98d9b91550a11b9b57baedbe" }, { "url": "https://git.kernel.org/stable/c/f816b9829b19394d318e01953aa3b2721bca040d" } ], "title": "net: fec: Better handle pm_runtime_get() failing in .remove()", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-53308", "datePublished": "2025-09-16T16:11:46.998Z", "dateReserved": "2025-09-16T16:08:59.561Z", "dateUpdated": "2025-09-16T16:11:46.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-53308\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-16T17:15:36.597\",\"lastModified\":\"2025-09-17T14:18:55.093\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: fec: Better handle pm_runtime_get() failing in .remove()\\n\\nIn the (unlikely) event that pm_runtime_get() (disguised as\\npm_runtime_resume_and_get()) fails, the remove callback returned an\\nerror early. The problem with this is that the driver core ignores the\\nerror value and continues removing the device. This results in a\\nresource leak. Worse the devm allocated resources are freed and so if a\\ncallback of the driver is called later the register mapping is already\\ngone which probably results in a crash.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/83996d317b1deddc85006376082e8886f55aa709\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9407454a9b18bbeff216e8ecde87ffb2171e9ccf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b22b514209ff8c4287abb853399890ab97e1b5ca\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/be85912c36ddca3e8b2eef1b5392cd8db6bdb730\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c1bc2870f14e526a01897e14c747a0a0ca125231\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d52a0cca591e899d4e5c8ab19e067b4c6b7d104f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e02d8d5b1602689b98d9b91550a11b9b57baedbe\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f816b9829b19394d318e01953aa3b2721bca040d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…