-

CVE-2022-50703

soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()

In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()

There are two refcount leak bugs in qcom_smsm_probe():

(1) The 'local_node' is escaped out from for_each_child_of_node() as
the break of iteration, we should call of_node_put() for it in error
path or when it is not used anymore.
(2) The 'node' is escaped out from for_each_available_child_of_node()
as the 'goto', we should call of_node_put() for it in goto target.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version c97c4090ff72297a878a37715bd301624b71c885
Version < 1bbe75d466e5118b7d49ef4a346c3ce5742da4e8
Status affected
Version c97c4090ff72297a878a37715bd301624b71c885
Version < bd4666bf5562fe8e8e5e9bd6fc805d30e1767f43
Status affected
Version c97c4090ff72297a878a37715bd301624b71c885
Version < 42df28994eba7b56c762f7bbe7efd5611a1cd15b
Status affected
Version c97c4090ff72297a878a37715bd301624b71c885
Version < 1e3ed59370c712df436791efed120f0c082aa9bc
Status affected
Version c97c4090ff72297a878a37715bd301624b71c885
Version < 39781c98ad46b4e85053345dff797240c1ed7935
Status affected
Version c97c4090ff72297a878a37715bd301624b71c885
Version < 96e0028debdd07a6d582f0dfadf9a3ec2b5fffff
Status affected
Version c97c4090ff72297a878a37715bd301624b71c885
Version < 8fb6112bd49c0e49f2cf51604231d85ff00284bb
Status affected
Version c97c4090ff72297a878a37715bd301624b71c885
Version < ee7fc83ce0e6986ff9b1c1d7e994fbbf8d43861d
Status affected
Version c97c4090ff72297a878a37715bd301624b71c885
Version < af8f6f39b8afd772fda4f8e61823ef8c021bf382
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.5
Status affected
Version 0
Version < 4.5
Status unaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.196
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.