{"id":"CVE-2022-50703","summary":"soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()\n\nThere are two refcount leak bugs in qcom_smsm_probe():\n\n(1) The 'local_node' is escaped out from for_each_child_of_node() as\nthe break of iteration, we should call of_node_put() for it in error\npath or when it is not used anymore.\n(2) The 'node' is escaped out from for_each_available_child_of_node()\nas the 'goto', we should call of_node_put() for it in goto target.","modified":"2026-04-02T08:28:42.859770Z","published":"2025-12-24T10:55:18.548Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0350-1","SUSE-SU-2026:0369-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50703.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1bbe75d466e5118b7d49ef4a346c3ce5742da4e8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1e3ed59370c712df436791efed120f0c082aa9bc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/39781c98ad46b4e85053345dff797240c1ed7935"},{"type":"WEB","url":"https://git.kernel.org/stable/c/42df28994eba7b56c762f7bbe7efd5611a1cd15b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8fb6112bd49c0e49f2cf51604231d85ff00284bb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/96e0028debdd07a6d582f0dfadf9a3ec2b5fffff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/af8f6f39b8afd772fda4f8e61823ef8c021bf382"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bd4666bf5562fe8e8e5e9bd6fc805d30e1767f43"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee7fc83ce0e6986ff9b1c1d7e994fbbf8d43861d"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50703.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50703"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c97c4090ff72297a878a37715bd301624b71c885"},{"fixed":"1bbe75d466e5118b7d49ef4a346c3ce5742da4e8"},{"fixed":"bd4666bf5562fe8e8e5e9bd6fc805d30e1767f43"},{"fixed":"42df28994eba7b56c762f7bbe7efd5611a1cd15b"},{"fixed":"1e3ed59370c712df436791efed120f0c082aa9bc"},{"fixed":"39781c98ad46b4e85053345dff797240c1ed7935"},{"fixed":"96e0028debdd07a6d582f0dfadf9a3ec2b5fffff"},{"fixed":"8fb6112bd49c0e49f2cf51604231d85ff00284bb"},{"fixed":"ee7fc83ce0e6986ff9b1c1d7e994fbbf8d43861d"},{"fixed":"af8f6f39b8afd772fda4f8e61823ef8c021bf382"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50703.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.5.0"},{"fixed":"4.9.331"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.296"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.262"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.220"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.150"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.75"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.19.17"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.20.0"},{"fixed":"6.0.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50703.json"}}],"schema_version":"1.7.5"}