CVE-2024-42089
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
29/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ASoC: fsl-asoc-card: set priv->pdev before using it<br />
<br />
priv->pdev pointer was set after being used in<br />
fsl_asoc_card_audmux_init().<br />
Move this assignment at the start of the probe function, so<br />
sub-functions can correctly use pdev through priv.<br />
<br />
fsl_asoc_card_audmux_init() dereferences priv->pdev to get access to the<br />
dev struct, used with dev_err macros.<br />
As priv is zero-initialised, there would be a NULL pointer dereference.<br />
Note that if priv->dev is dereferenced before assignment but never used,<br />
for example if there is no error to be printed, the driver won&#39;t crash<br />
probably due to compiler optimisations.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.18 (including) | 4.19.317 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.279 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.221 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.162 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.97 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.37 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/29bc9e7c75398b0d12fc30955f2e9b2dd29ffaed
- https://git.kernel.org/stable/c/3662eb2170e59b58ad479982dc1084889ba757b9
- https://git.kernel.org/stable/c/544ab46b7ece6d6bebbdee5d5659c0a0f804a99a
- https://git.kernel.org/stable/c/7c18b4d89ff9c810b6e562408afda5ce165c4ea6
- https://git.kernel.org/stable/c/8896e18b7c366f8faf9344abfd0971435f1c723a
- https://git.kernel.org/stable/c/8faf91e58425c2f6ce773250dfd995f1c2d461ac
- https://git.kernel.org/stable/c/90f3feb24172185f1832636264943e8b5e289245
- https://git.kernel.org/stable/c/ae81535ce2503aabc4adab3472f4338070cdeb6a
- https://git.kernel.org/stable/c/29bc9e7c75398b0d12fc30955f2e9b2dd29ffaed
- https://git.kernel.org/stable/c/3662eb2170e59b58ad479982dc1084889ba757b9
- https://git.kernel.org/stable/c/544ab46b7ece6d6bebbdee5d5659c0a0f804a99a
- https://git.kernel.org/stable/c/7c18b4d89ff9c810b6e562408afda5ce165c4ea6
- https://git.kernel.org/stable/c/8896e18b7c366f8faf9344abfd0971435f1c723a
- https://git.kernel.org/stable/c/8faf91e58425c2f6ce773250dfd995f1c2d461ac
- https://git.kernel.org/stable/c/90f3feb24172185f1832636264943e8b5e289245
- https://git.kernel.org/stable/c/ae81535ce2503aabc4adab3472f4338070cdeb6a
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



