Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak In arizona_clk32k_enable(), we should use pm_runtime_resume_and_get() as pm_runtime_get_sync() will increase the refcnt even when it returns an error.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 5.4.235 |
References
- https://git.kernel.org/stable/c/4414a7ab80cebf715045e3c4d465feefbad21139Patch
- https://git.kernel.org/stable/c/5a47bb71b1a94a279144fc3031d3c4591b38dd16Patch
- https://git.kernel.org/stable/c/7195e642b49af60d4120fa1b45bd812ba528174fPatch
- https://git.kernel.org/stable/c/754e81ff44061dda68da0fd4ef51bd1aa9fbf2cfPatch
- https://git.kernel.org/stable/c/9893771097b22a8743a446e45994a177795ca4daPatch
- https://git.kernel.org/stable/c/dc9437e9889c3dacf1f320e3cf08da74127573fePatch
FAQ
What is CVE-2023-53443?
CVE-2023-53443 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak In arizona_clk32k_enable(), we should use pm_runtime_resume_a...
How severe is CVE-2023-53443?
CVE-2023-53443 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53443?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.