Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-48820

Опубликовано: 16 июл. 2024
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() This error path needs to decrement "usbphyc->n_pll_cons.counter" before returning.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.16.10-1package
linuxnot-affectedbullseyepackage

Примечания

  • https://git.kernel.org/linus/cfc826c88a79e22ba5d8001556eb2c7efd8a01b6 (5.17-rc4)

EPSS

Процентиль: 7%
0.00031
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() This error path needs to decrement "usbphyc->n_pll_cons.counter" before returning.

CVSS3: 6.1
redhat
11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() This error path needs to decrement "usbphyc->n_pll_cons.counter" before returning.

CVSS3: 7.1
nvd
11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() This error path needs to decrement "usbphyc->n_pll_cons.counter" before returning.

CVSS3: 7.1
github
11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() This error path needs to decrement "usbphyc->n_pll_cons.counter" before returning.

CVSS3: 7.1
fstec
больше 3 лет назад

Уязвимость функции stm32_usbphyc_pll_enable() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

EPSS

Процентиль: 7%
0.00031
Низкий