CVE-2026-43480
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/05/2026
Última modificación:
13/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition<br />
<br />
The acp3x_5682_init() function did not check the return value of<br />
clk_get(), which could lead to dereferencing error pointers in<br />
rt5682_clk_enable().<br />
<br />
Fix this by:<br />
1. Changing clk_get() to the device-managed devm_clk_get().<br />
2. Adding proper IS_ERR() checks for both clock acquisitions.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/092522621901b5e6af61db04a53f5b313903c6d0
- https://git.kernel.org/stable/c/2b0c4a399c8d27f20ecf17dda76751141d6dbb59
- https://git.kernel.org/stable/c/2dc43ac8da7b2bebc5a51a3d86a6275d78f27cff
- https://git.kernel.org/stable/c/33de168afdd57265a0e0c20dbd3648a2d8f7cdc4
- https://git.kernel.org/stable/c/35c7624d30cb45ec336cd16ce072acc32ae351cb
- https://git.kernel.org/stable/c/4d802f23fcbfec05134653fd001f6c7c3fd55196
- https://git.kernel.org/stable/c/53f3a900e9a383d47af7253076e19f510c5708d0
- https://git.kernel.org/stable/c/790851ecc983c719fa2e6adb17b02f3acc1d217d



