{"id":"CVE-2023-53666","summary":"ASoC: codecs: wcd938x: fix missing mbhc init error handling","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: codecs: wcd938x: fix missing mbhc init error handling\n\nMBHC initialisation can fail so add the missing error handling to avoid\ndereferencing an error pointer when later configuring the jack:\n\n    Unable to handle kernel paging request at virtual address fffffffffffffff8\n\n    pc : wcd_mbhc_start+0x28/0x380 [snd_soc_wcd_mbhc]\n    lr : wcd938x_codec_set_jack+0x28/0x48 [snd_soc_wcd938x]\n\n    Call trace:\n     wcd_mbhc_start+0x28/0x380 [snd_soc_wcd_mbhc]\n     wcd938x_codec_set_jack+0x28/0x48 [snd_soc_wcd938x]\n     snd_soc_component_set_jack+0x28/0x8c [snd_soc_core]\n     qcom_snd_wcd_jack_setup+0x7c/0x19c [snd_soc_qcom_common]\n     sc8280xp_snd_init+0x20/0x2c [snd_soc_sc8280xp]\n     snd_soc_link_init+0x28/0x90 [snd_soc_core]\n     snd_soc_bind_card+0x628/0xbfc [snd_soc_core]\n     snd_soc_register_card+0xec/0x104 [snd_soc_core]\n     devm_snd_soc_register_card+0x4c/0xa4 [snd_soc_core]\n     sc8280xp_platform_probe+0xf0/0x108 [snd_soc_sc8280xp]","modified":"2026-03-20T12:33:17.068301Z","published":"2025-10-07T15:21:24.490Z","related":["SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4301-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53666.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/31ee704c84c4bf4df8521ef1478c161f710d0f94"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5a34d252052b5da743ef82591c860fc947384d4e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7dfae2631bfbdebecd35fe7b472ab3cc95c9ed66"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bb241ae928c694e365c30c888c9eb02dcc812dfd"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53666.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53666"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bcee7ed09b8e70b65d5c04f5d1acd2cf4213c2f3"},{"fixed":"5a34d252052b5da743ef82591c860fc947384d4e"},{"fixed":"bb241ae928c694e365c30c888c9eb02dcc812dfd"},{"fixed":"31ee704c84c4bf4df8521ef1478c161f710d0f94"},{"fixed":"7dfae2631bfbdebecd35fe7b472ab3cc95c9ed66"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53666.json"}}],"schema_version":"1.7.5"}