Impact
The Linux kernel audio driver for the AMD acp3x-rt5682-max9836 codec fails to verify the result of a clock acquisition call. When clk_get() returns an error pointer, the code later dereferences it in rt5682_clk_enable(), causing a null pointer dereference and a kernel panic. This failure is a classic CWE‑390 flaw that results in an immediate service outage for any system that loads the affected driver at boot or during runtime.
Affected Systems
This vulnerability is confined to the Linux kernel, specifically the ASoC subsystem for AMD audio devices. Any kernel build that includes the acp3x-rt5682-max9836 driver is potentially affected. No specific version range is listed, implying that the issue may exist in all unpatched kernel versions that ship the buggy driver.
Risk and Exploitability
Based on the description, it is inferred that the attack vector is local; an attacker who can influence driver initialization—by loading a module, manipulating device configuration, or forcing a clock acquisition failure—is able to trigger the kernel panic. The flaw leads to a complete kernel crash, making it a high‑impact denial of service attack. The EPSS score of <1% indicates a very low probability of exploitation in the wild, and CISA has not listed the vulnerability in its KEV catalog. However, the severity remains significant in embedded or production environments where continuous audio service is required.
OpenCVE Enrichment