Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() If clk_hw_register() fails, the corresponding clk should not be unregistered. To handle errors from loops, clean up partial iterations before doing the goto. So add a clk_hw_unregister(). Then use a while (--i >= 0) loop in the unwind section.
References
- https://git.kernel.org/stable/c/4993c1511d66326f1037bc5156b024a6a96d23ef
- https://git.kernel.org/stable/c/abb4e4349afe7eecdb0499582f1c777031e3a7c8
- https://git.kernel.org/stable/c/cefce8bee0e988f9a005fe40705b98a25cfb7f9d
- https://git.kernel.org/stable/c/ec692f0b51006de1138cd1f82cae625f0d2888d1
- https://git.kernel.org/stable/c/f5f1f5ee5048cfa7bd07f496b33bd2cfc198a176
FAQ
What is CVE-2022-50698?
CVE-2022-50698 is a documented vulnerability. In the Linux kernel, the following vulnerability has been resolved: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() If clk_hw_register() fails, the corresponding clk should no...
How severe is CVE-2022-50698?
CVSS scoring is not yet available for CVE-2022-50698. Check NVD for updates.
Is there a patch for CVE-2022-50698?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.