Description
In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition

The acp3x_5682_init() function did not check the return value of
clk_get(), which could lead to dereferencing error pointers in
rt5682_clk_enable().

Fix this by:
1. Changing clk_get() to the device-managed devm_clk_get().
2. Adding proper IS_ERR() checks for both clock acquisitions.
Published: 2026-05-13
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel audio driver for the AMD acp3x-rt5682-max9836 codec fails to verify the result of a clock acquisition call. When clk_get() returns an error pointer, the code later dereferences it in rt5682_clk_enable(), causing a null pointer dereference and a kernel panic. This failure is a classic CWE‑390 flaw that results in an immediate service outage for any system that loads the affected driver at boot or during runtime.

Affected Systems

This vulnerability is confined to the Linux kernel, specifically the ASoC subsystem for AMD audio devices. Any kernel build that includes the acp3x-rt5682-max9836 driver is potentially affected. No specific version range is listed, implying that the issue may exist in all unpatched kernel versions that ship the buggy driver.

Risk and Exploitability

Based on the description, it is inferred that the attack vector is local; an attacker who can influence driver initialization—by loading a module, manipulating device configuration, or forcing a clock acquisition failure—is able to trigger the kernel panic. The flaw leads to a complete kernel crash, making it a high‑impact denial of service attack. The EPSS score of <1% indicates a very low probability of exploitation in the wild, and CISA has not listed the vulnerability in its KEV catalog. However, the severity remains significant in embedded or production environments where continuous audio service is required.

Generated by OpenCVE AI on May 14, 2026 at 16:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a release that includes the fix for CVE-2026-43480
  • If an immediate kernel update is not feasible, block the acp3x-rt5682-max9836 driver by adding a modprobe blacklist entry or removing the module from initramfs
  • Ensure no services or scripts load audio drivers that reference this codec during boot; disable or reconfigure such services to prevent accidental driver initialization

Generated by OpenCVE AI on May 14, 2026 at 16:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Thu, 14 May 2026 12:15:00 +0000


Wed, 13 May 2026 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition The acp3x_5682_init() function did not check the return value of clk_get(), which could lead to dereferencing error pointers in rt5682_clk_enable(). Fix this by: 1. Changing clk_get() to the device-managed devm_clk_get(). 2. Adding proper IS_ERR() checks for both clock acquisitions.
Title ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-13T15:08:28.517Z

Reserved: 2026-05-01T14:12:56.012Z

Link: CVE-2026-43480

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-13T16:16:51.163

Modified: 2026-05-13T16:16:51.163

Link: CVE-2026-43480

cve-icon Redhat

Severity :

Publid Date: 2026-05-13T00:00:00Z

Links: CVE-2026-43480 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T16:30:24Z

Weaknesses