CVE-2024-42089

In the Linux kernel, the following vulnerability has been resolved: ASoC: fsl-asoc-card: set priv->pdev before using it priv->pdev pointer was set after being used in fsl_asoc_card_audmux_init(). Move this assignment at the start of the probe function, so sub-functions can correctly use pdev through priv. fsl_asoc_card_audmux_init() dereferences priv->pdev to get access to the dev struct, used with dev_err macros. As priv is zero-initialised, there would be a NULL pointer dereference. Note that if priv->dev is dereferenced before assignment but never used, for example if there is no error to be printed, the driver won't crash probably due to compiler optimisations.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*

History

03 Feb 2025, 15:23

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
CWE CWE-476
References () https://git.kernel.org/stable/c/29bc9e7c75398b0d12fc30955f2e9b2dd29ffaed - () https://git.kernel.org/stable/c/29bc9e7c75398b0d12fc30955f2e9b2dd29ffaed - Patch
References () https://git.kernel.org/stable/c/3662eb2170e59b58ad479982dc1084889ba757b9 - () https://git.kernel.org/stable/c/3662eb2170e59b58ad479982dc1084889ba757b9 - Patch
References () https://git.kernel.org/stable/c/544ab46b7ece6d6bebbdee5d5659c0a0f804a99a - () https://git.kernel.org/stable/c/544ab46b7ece6d6bebbdee5d5659c0a0f804a99a - Patch
References () https://git.kernel.org/stable/c/7c18b4d89ff9c810b6e562408afda5ce165c4ea6 - () https://git.kernel.org/stable/c/7c18b4d89ff9c810b6e562408afda5ce165c4ea6 - Patch
References () https://git.kernel.org/stable/c/8896e18b7c366f8faf9344abfd0971435f1c723a - () https://git.kernel.org/stable/c/8896e18b7c366f8faf9344abfd0971435f1c723a - Patch
References () https://git.kernel.org/stable/c/8faf91e58425c2f6ce773250dfd995f1c2d461ac - () https://git.kernel.org/stable/c/8faf91e58425c2f6ce773250dfd995f1c2d461ac - Patch
References () https://git.kernel.org/stable/c/90f3feb24172185f1832636264943e8b5e289245 - () https://git.kernel.org/stable/c/90f3feb24172185f1832636264943e8b5e289245 - Patch
References () https://git.kernel.org/stable/c/ae81535ce2503aabc4adab3472f4338070cdeb6a - () https://git.kernel.org/stable/c/ae81535ce2503aabc4adab3472f4338070cdeb6a - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/29bc9e7c75398b0d12fc30955f2e9b2dd29ffaed - () https://git.kernel.org/stable/c/29bc9e7c75398b0d12fc30955f2e9b2dd29ffaed -
References () https://git.kernel.org/stable/c/3662eb2170e59b58ad479982dc1084889ba757b9 - () https://git.kernel.org/stable/c/3662eb2170e59b58ad479982dc1084889ba757b9 -
References () https://git.kernel.org/stable/c/544ab46b7ece6d6bebbdee5d5659c0a0f804a99a - () https://git.kernel.org/stable/c/544ab46b7ece6d6bebbdee5d5659c0a0f804a99a -
References () https://git.kernel.org/stable/c/7c18b4d89ff9c810b6e562408afda5ce165c4ea6 - () https://git.kernel.org/stable/c/7c18b4d89ff9c810b6e562408afda5ce165c4ea6 -
References () https://git.kernel.org/stable/c/8896e18b7c366f8faf9344abfd0971435f1c723a - () https://git.kernel.org/stable/c/8896e18b7c366f8faf9344abfd0971435f1c723a -
References () https://git.kernel.org/stable/c/8faf91e58425c2f6ce773250dfd995f1c2d461ac - () https://git.kernel.org/stable/c/8faf91e58425c2f6ce773250dfd995f1c2d461ac -
References () https://git.kernel.org/stable/c/90f3feb24172185f1832636264943e8b5e289245 - () https://git.kernel.org/stable/c/90f3feb24172185f1832636264943e8b5e289245 -
References () https://git.kernel.org/stable/c/ae81535ce2503aabc4adab3472f4338070cdeb6a - () https://git.kernel.org/stable/c/ae81535ce2503aabc4adab3472f4338070cdeb6a -

30 Jul 2024, 13:33

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: fsl-asoc-card: establezca priv->pdev antes de usarlo. El puntero priv->pdev se configuró después de usarse en fsl_asoc_card_audmux_init(). Mueva esta asignación al inicio de la función de sonda, para que las subfunciones puedan usar correctamente pdev a través de priv. fsl_asoc_card_audmux_init() elimina la referencia a priv->pdev para obtener acceso a la estructura dev, utilizada con las macros dev_err. Como priv está inicializado en cero, habría una desreferencia del puntero NULL. Tenga en cuenta que si se elimina la referencia a priv->dev antes de la asignación pero nunca se usa, por ejemplo, si no hay ningún error que imprimir, el controlador nofallará probablemente debido a las optimizaciones del compilador.

29 Jul 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 17:15

Updated : 2025-02-03 15:23


NVD link : CVE-2024-42089

Mitre link : CVE-2024-42089

CVE.ORG link : CVE-2024-42089


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference