๐Ÿ” CVE Alert

CVE-2023-53177

UNKNOWN 0.0

media: hi846: fix usage of pm_runtime_get_if_in_use()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: media: hi846: fix usage of pm_runtime_get_if_in_use() pm_runtime_get_if_in_use() does not only return nonzero values when the device is in use, it can return a negative errno too. And especially during resuming from system suspend, when runtime pm is not yet up again, -EAGAIN is being returned, so the subsequent pm_runtime_put() call results in a refcount underflow. Fix system-resume by handling -EAGAIN of pm_runtime_get_if_in_use().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 15, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e8c0882685f9152f0d729664a12bcbe749cb7736 < 42ec6269f98edd915ee37da3c6456bb6243ea56a e8c0882685f9152f0d729664a12bcbe749cb7736 < c5dcd7a19f1ed8fe98384f3a9444c7c53befd74e e8c0882685f9152f0d729664a12bcbe749cb7736 < 04fc06f6dc1592ed5d675311ac50d8fba5db62ab
Linux / Linux
5.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/42ec6269f98edd915ee37da3c6456bb6243ea56a git.kernel.org: https://git.kernel.org/stable/c/c5dcd7a19f1ed8fe98384f3a9444c7c53befd74e git.kernel.org: https://git.kernel.org/stable/c/04fc06f6dc1592ed5d675311ac50d8fba5db62ab