U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-53308 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net: fec: Better handle pm_runtime_get() failing in .remove() In the (unlikely) event that pm_runtime_get() (disguised as pm_runtime_resume_and_get()) fails, the remove callback returned an error early. The problem with this is that the driver core ignores the error value and continues removing the device. This results in a resource leak. Worse the devm allocated resources are freed and so if a callback of the driver is called later the register mapping is already gone which probably results in a crash.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/83996d317b1deddc85006376082e8886f55aa709 kernel.org
https://git.kernel.org/stable/c/9407454a9b18bbeff216e8ecde87ffb2171e9ccf kernel.org
https://git.kernel.org/stable/c/b22b514209ff8c4287abb853399890ab97e1b5ca kernel.org
https://git.kernel.org/stable/c/be85912c36ddca3e8b2eef1b5392cd8db6bdb730 kernel.org
https://git.kernel.org/stable/c/c1bc2870f14e526a01897e14c747a0a0ca125231 kernel.org
https://git.kernel.org/stable/c/d52a0cca591e899d4e5c8ab19e067b4c6b7d104f kernel.org
https://git.kernel.org/stable/c/e02d8d5b1602689b98d9b91550a11b9b57baedbe kernel.org
https://git.kernel.org/stable/c/f816b9829b19394d318e01953aa3b2721bca040d kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-53308
NVD Published Date:
09/16/2025
NVD Last Modified:
09/16/2025
Source:
kernel.org