In the Linux kernel, the following vulnerability has been resolved:
phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()
This error path needs to decrement “usbphyc->n_pll_cons.counter” before
returning.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux-intel-iotg-5.15 | < any | UNKNOWN |
git.kernel.org/linus/cfc826c88a79e22ba5d8001556eb2c7efd8a01b6 (5.17-rc4)
git.kernel.org/stable/c/0ad1a88fa3eb0ded7798f52b79bc33f75fc9a6d2
git.kernel.org/stable/c/94b16ca86ab688ed6fad4548f70137f93cf1f0a9
git.kernel.org/stable/c/cfc826c88a79e22ba5d8001556eb2c7efd8a01b6
launchpad.net/bugs/cve/CVE-2022-48820
nvd.nist.gov/vuln/detail/CVE-2022-48820
security-tracker.debian.org/tracker/CVE-2022-48820
www.cve.org/CVERecord?id=CVE-2022-48820