{"id":"CVE-2024-42089","summary":"ASoC: fsl-asoc-card: set priv-\u003epdev before using it","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: fsl-asoc-card: set priv-\u003epdev before using it\n\npriv-\u003epdev pointer was set after being used in\nfsl_asoc_card_audmux_init().\nMove this assignment at the start of the probe function, so\nsub-functions can correctly use pdev through priv.\n\nfsl_asoc_card_audmux_init() dereferences priv-\u003epdev to get access to the\ndev struct, used with dev_err macros.\nAs priv is zero-initialised, there would be a NULL pointer dereference.\nNote that if priv-\u003edev is dereferenced before assignment but never used,\nfor example if there is no error to be printed, the driver won't crash\nprobably due to compiler optimisations.","modified":"2026-04-02T12:17:45.895078Z","published":"2024-07-29T16:26:29.288Z","related":["SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42089.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/29bc9e7c75398b0d12fc30955f2e9b2dd29ffaed"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3662eb2170e59b58ad479982dc1084889ba757b9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/544ab46b7ece6d6bebbdee5d5659c0a0f804a99a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7c18b4d89ff9c810b6e562408afda5ce165c4ea6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8896e18b7c366f8faf9344abfd0971435f1c723a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8faf91e58425c2f6ce773250dfd995f1c2d461ac"},{"type":"WEB","url":"https://git.kernel.org/stable/c/90f3feb24172185f1832636264943e8b5e289245"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ae81535ce2503aabc4adab3472f4338070cdeb6a"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42089.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42089"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"708b4351f08c08ea93f773fb9197bdd3f3b08273"},{"fixed":"ae81535ce2503aabc4adab3472f4338070cdeb6a"},{"fixed":"8896e18b7c366f8faf9344abfd0971435f1c723a"},{"fixed":"3662eb2170e59b58ad479982dc1084889ba757b9"},{"fixed":"544ab46b7ece6d6bebbdee5d5659c0a0f804a99a"},{"fixed":"8faf91e58425c2f6ce773250dfd995f1c2d461ac"},{"fixed":"29bc9e7c75398b0d12fc30955f2e9b2dd29ffaed"},{"fixed":"7c18b4d89ff9c810b6e562408afda5ce165c4ea6"},{"fixed":"90f3feb24172185f1832636264943e8b5e289245"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42089.json"}}],"schema_version":"1.7.5"}