-
CVE-2022-50698
- EPSS 0.03%
- Veröffentlicht 24.12.2025 10:55:14
- Zuletzt bearbeitet 29.12.2025 15:58:56
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() If clk_hw_register() fails, the corresponding clk should not be unregistered. To handle errors from loops, clean up partial iterations before doing the goto. So add a clk_hw_unregister(). Then use a while (--i >= 0) loop in the unwind section.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
4993c1511d66326f1037bc5156b024a6a96d23ef
Version
78013a1cf2971684775f6956d5666237ac53a1aa
Status
affected
Version <
f5f1f5ee5048cfa7bd07f496b33bd2cfc198a176
Version
78013a1cf2971684775f6956d5666237ac53a1aa
Status
affected
Version <
ec692f0b51006de1138cd1f82cae625f0d2888d1
Version
78013a1cf2971684775f6956d5666237ac53a1aa
Status
affected
Version <
cefce8bee0e988f9a005fe40705b98a25cfb7f9d
Version
78013a1cf2971684775f6956d5666237ac53a1aa
Status
affected
Version <
abb4e4349afe7eecdb0499582f1c777031e3a7c8
Version
78013a1cf2971684775f6956d5666237ac53a1aa
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.10
Status
affected
Version <
5.10
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.065 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|