CVE-2022-50698

Source
https://cve.org/CVERecord?id=CVE-2022-50698
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50698.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50698
Downstream
Related
Published
2025-12-24T10:55:14.740Z
Modified
2026-04-02T08:28:42.157160Z
Summary
ASoC: da7219: Fix an error handling path in da7219_register_dai_clks()
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: da7219: Fix an error handling path in da7219registerdai_clks()

If clkhwregister() fails, the corresponding clk should not be unregistered.

To handle errors from loops, clean up partial iterations before doing the goto. So add a clkhwunregister(). Then use a while (--i >= 0) loop in the unwind section.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50698.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
78013a1cf2971684775f6956d5666237ac53a1aa
Fixed
4993c1511d66326f1037bc5156b024a6a96d23ef
Fixed
f5f1f5ee5048cfa7bd07f496b33bd2cfc198a176
Fixed
ec692f0b51006de1138cd1f82cae625f0d2888d1
Fixed
cefce8bee0e988f9a005fe40705b98a25cfb7f9d
Fixed
abb4e4349afe7eecdb0499582f1c777031e3a7c8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50698.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.0
Fixed
5.10.150
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.75
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50698.json"