First published: Tue Jul 16 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() This error path needs to decrement "usbphyc->n_pll_cons.counter" before returning.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.12<5.15.24 | |
Linux Kernel | >=5.16<5.16.10 | |
Linux Kernel | =5.17-rc1 | |
Linux Kernel | =5.17-rc2 | |
Linux Kernel | =5.17-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48820 is classified as a low-severity vulnerability affecting the Linux kernel.
CVE-2022-48820 affects the STM32 USB PHY controller in specific versions of the Linux kernel.
To resolve CVE-2022-48820, update to a patched version of the Linux kernel that addresses the refcount leak.
Users running versions of the Linux kernel between 5.12 and 5.15.24, or certain 5.17 release candidates are affected by CVE-2022-48820.
CVE-2022-48820 is a refcount leak vulnerability in the Linux kernel.