Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: acp-mach-common: Add missing error check for clock acquisition The acp_card_rt5682_init() and acp_card_rt5682s_init() functions did not check the return values of clk_get(). This could lead to a kernel crash when the invalid pointers are later dereferenced by clock core functions. Fix this by: 1. Changing clk_get() to the device-managed devm_clk_get(). 2. Adding IS_ERR() checks immediately after each clock acquisition.

INFO

Published Date :

2026-05-08T14:22:11.303Z

Last Modified :

2026-05-08T14:22:11.303Z

Source :

Linux
AFFECTED PRODUCTS

The following products are affected by CVE-2026-43443 vulnerability.

Vendors Products
Linux
  • Linux Kernel
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-43443.

CVSS Vulnerability Scoring System