U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-50703 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() There are two refcount leak bugs in qcom_smsm_probe(): (1) The 'local_node' is escaped out from for_each_child_of_node() as the break of iteration, we should call of_node_put() for it in error path or when it is not used anymore. (2) The 'node' is escaped out from for_each_available_child_of_node() as the 'goto', we should call of_node_put() for it in goto target.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/1bbe75d466e5118b7d49ef4a346c3ce5742da4e8 kernel.org
https://git.kernel.org/stable/c/1e3ed59370c712df436791efed120f0c082aa9bc kernel.org
https://git.kernel.org/stable/c/39781c98ad46b4e85053345dff797240c1ed7935 kernel.org
https://git.kernel.org/stable/c/42df28994eba7b56c762f7bbe7efd5611a1cd15b kernel.org
https://git.kernel.org/stable/c/8fb6112bd49c0e49f2cf51604231d85ff00284bb kernel.org
https://git.kernel.org/stable/c/96e0028debdd07a6d582f0dfadf9a3ec2b5fffff kernel.org
https://git.kernel.org/stable/c/af8f6f39b8afd772fda4f8e61823ef8c021bf382 kernel.org
https://git.kernel.org/stable/c/bd4666bf5562fe8e8e5e9bd6fc805d30e1767f43 kernel.org
https://git.kernel.org/stable/c/ee7fc83ce0e6986ff9b1c1d7e994fbbf8d43861d kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-50703
NVD Published Date:
12/24/2025
NVD Last Modified:
12/24/2025
Source:
kernel.org