CVE-2024-26975

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix a NULL pointer dereference A NULL pointer dereference is triggered when probing the MMIO RAPL driver on platforms with CPU ID not listed in intel_rapl_common CPU model list. This is because the intel_rapl_common module still probes on such platforms even if 'defaults_msr' is not set after commit 1488ac990ac8 ("powercap: intel_rapl: Allow probing without CPUID match"). Thus the MMIO RAPL rp->priv->defaults is NULL when registering to RAPL framework. Fix the problem by adding sanity check to ensure rp->priv->rapl_defaults is always valid.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Dec 2024, 14:02

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78 - () https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78 - Patch
References () https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e - () https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e - Patch
References () https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6 - () https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6 - Patch
References () https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1 - () https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1 - Patch
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

Information

Published : 2024-05-01 06:15

Updated : 2024-12-23 14:02


NVD link : CVE-2024-26975

Mitre link : CVE-2024-26975

CVE.ORG link : CVE-2024-26975


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference