-

CVE-2022-50703

In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()

There are two refcount leak bugs in qcom_smsm_probe():

(1) The 'local_node' is escaped out from for_each_child_of_node() as
the break of iteration, we should call of_node_put() for it in error
path or when it is not used anymore.
(2) The 'node' is escaped out from for_each_available_child_of_node()
as the 'goto', we should call of_node_put() for it in goto target.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 1bbe75d466e5118b7d49ef4a346c3ce5742da4e8
Version c97c4090ff72297a878a37715bd301624b71c885
Status affected
Version < bd4666bf5562fe8e8e5e9bd6fc805d30e1767f43
Version c97c4090ff72297a878a37715bd301624b71c885
Status affected
Version < 42df28994eba7b56c762f7bbe7efd5611a1cd15b
Version c97c4090ff72297a878a37715bd301624b71c885
Status affected
Version < 1e3ed59370c712df436791efed120f0c082aa9bc
Version c97c4090ff72297a878a37715bd301624b71c885
Status affected
Version < 39781c98ad46b4e85053345dff797240c1ed7935
Version c97c4090ff72297a878a37715bd301624b71c885
Status affected
Version < 96e0028debdd07a6d582f0dfadf9a3ec2b5fffff
Version c97c4090ff72297a878a37715bd301624b71c885
Status affected
Version < 8fb6112bd49c0e49f2cf51604231d85ff00284bb
Version c97c4090ff72297a878a37715bd301624b71c885
Status affected
Version < ee7fc83ce0e6986ff9b1c1d7e994fbbf8d43861d
Version c97c4090ff72297a878a37715bd301624b71c885
Status affected
Version < af8f6f39b8afd772fda4f8e61823ef8c021bf382
Version c97c4090ff72297a878a37715bd301624b71c885
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.5
Status affected
Version < 4.5
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.146
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.