-

CVE-2026-43480

ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition

In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition

The acp3x_5682_init() function did not check the return value of
clk_get(), which could lead to dereferencing error pointers in
rt5682_clk_enable().

Fix this by:
1. Changing clk_get() to the device-managed devm_clk_get().
2. Adding proper IS_ERR() checks for both clock acquisitions.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 6b8e4e7db3cd236a2cbb720360fb135087a2ac1d
Version < 2dc43ac8da7b2bebc5a51a3d86a6275d78f27cff
Status affected
Version 6b8e4e7db3cd236a2cbb720360fb135087a2ac1d
Version < 4d802f23fcbfec05134653fd001f6c7c3fd55196
Status affected
Version 6b8e4e7db3cd236a2cbb720360fb135087a2ac1d
Version < 2b0c4a399c8d27f20ecf17dda76751141d6dbb59
Status affected
Version 6b8e4e7db3cd236a2cbb720360fb135087a2ac1d
Version < 35c7624d30cb45ec336cd16ce072acc32ae351cb
Status affected
Version 6b8e4e7db3cd236a2cbb720360fb135087a2ac1d
Version < 33de168afdd57265a0e0c20dbd3648a2d8f7cdc4
Status affected
Version 6b8e4e7db3cd236a2cbb720360fb135087a2ac1d
Version < 790851ecc983c719fa2e6adb17b02f3acc1d217d
Status affected
Version 6b8e4e7db3cd236a2cbb720360fb135087a2ac1d
Version < 092522621901b5e6af61db04a53f5b313903c6d0
Status affected
Version 6b8e4e7db3cd236a2cbb720360fb135087a2ac1d
Version < 53f3a900e9a383d47af7253076e19f510c5708d0
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.7
Status affected
Version 0
Version < 5.7
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.19
Status unaffected
Version <= 6.19.*
Version 6.19.9
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.071
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.