VYPR
Unrated severityNVD Advisory· Published May 13, 2026

CVE-2026-43480

CVE-2026-43480

Description

In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition

The acp3x_5682_init() function did not check the return value of clk_get(), which could lead to dereferencing error pointers in rt5682_clk_enable().

Fix this by: 1. Changing clk_get() to the device-managed devm_clk_get(). 2. Adding proper IS_ERR() checks for both clock acquisitions.

Affected products

1

Patches

8

Vulnerability mechanics

Root cause

"Missing error check for clk_get() return value in acp3x_5682_init() allows dereferencing an error pointer in rt5682_clk_enable()."

Attack vector

An attacker would need to cause clk_get() to fail (e.g., by removing or disabling the relevant clock device in the system) before the ASoC card initialization completes. When the system subsequently attempts to enable the clock via rt5682_clk_enable(), the unchecked error pointer from clk_get() is dereferenced, leading to a kernel crash or memory corruption. This is a local denial-of-service triggerable through clock subsystem manipulation on a system using the acp3x-rt5682-max9836 audio driver.

Affected code

The vulnerability is in the acp3x_5682_init() function within the ASoC AMD acp3x-rt5682-max9836 driver. The function calls clk_get() to acquire two clocks but does not check the return value for errors. The unchecked pointer is later passed to rt5682_clk_enable(), which dereferences it without validation.

What the fix does

The patch replaces clk_get() with devm_clk_get() so that clock resources are automatically managed and adds IS_ERR() checks after each clock acquisition. If devm_clk_get() returns an error pointer, the function now returns the error via PTR_ERR() instead of proceeding with an invalid clock reference. This prevents rt5682_clk_enable() from ever receiving an error pointer, closing the null/error-pointer dereference vulnerability.

Preconditions

  • inputThe attacker must be able to cause clk_get() to fail, e.g., by manipulating the clock subsystem (removing/disabling the clock device).
  • authLocal access is required to trigger the clock subsystem manipulation.

Generated on May 19, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.