CVE-2022-50698Linux vulnerability

7 documents6 sources
Severity
3.3LOW
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() If clk_hw_register() fails, the corresponding clk should not be unregistered. To handle errors from loops, clean up partial iterations before doing the goto. So add a clk_hw_unregister(). Then use a while (--i >= 0) loop in the unwind section.

Affected Packages4 packages

Linuxlinux/linux_kernel5.10.05.10.150+3
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linux78013a1cf2971684775f6956d5666237ac53a1aa4993c1511d66326f1037bc5156b024a6a96d23ef+5
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50698: In the Linux kernel, the following vulnerability has been resolved: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() If clk_hw_r2025-12-24
OSV
ASoC: da7219: Fix an error handling path in da7219_register_dai_clks()2025-12-24
GHSA
GHSA-2rxh-4vr2-w87x: In the Linux kernel, the following vulnerability has been resolved: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() If clk_hw2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks()2025-12-24
Debian
CVE-2022-50698: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: da721...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50698 Impact, Exploitability, and Mitigation Steps | Wiz