CVE-2024-42089 Affecting kernel-uek-tools package, versions <0:4.14.35-2047.541.4.1.el7uek


Severity

Recommended
high

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.04% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE7-KERNELUEKTOOLS-7943374
  • published13 Sept 2024
  • disclosed29 Jul 2024

Introduced: 29 Jul 2024

CVE-2024-42089  (opens in a new tab)

How to fix?

Upgrade Oracle:7 kernel-uek-tools to version 0:4.14.35-2047.541.4.1.el7uek or higher.
This issue was patched in ELSA-2024-12779.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-uek-tools package and not the kernel-uek-tools package as distributed by Oracle. See How to fix? for Oracle:7 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

ASoC: fsl-asoc-card: set priv->pdev before using it

priv->pdev pointer was set after being used in fsl_asoc_card_audmux_init(). Move this assignment at the start of the probe function, so sub-functions can correctly use pdev through priv.

fsl_asoc_card_audmux_init() dereferences priv->pdev to get access to the dev struct, used with dev_err macros. As priv is zero-initialised, there would be a NULL pointer dereference. Note that if priv->dev is dereferenced before assignment but never used, for example if there is no error to be printed, the driver won't crash probably due to compiler optimisations.

CVSS Scores

version 3.1