CVE-2024-26975

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix a NULL pointer dereference A NULL pointer dereference is triggered when probing the MMIO RAPL driver on platforms with CPU ID not listed in intel_rapl_common CPU model list. This is because the intel_rapl_common module still probes on such platforms even if 'defaults_msr' is not set after commit 1488ac990ac8 ("powercap: intel_rapl: Allow probing without CPUID match"). Thus the MMIO RAPL rp->priv->defaults is NULL when registering to RAPL framework. Fix the problem by adding sanity check to ensure rp->priv->rapl_defaults is always valid.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Dec 2024, 14:02

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78 - () https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78 - Patch
References () https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e - () https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e - Patch
References () https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6 - () https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6 - Patch
References () https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1 - () https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1 - Patch

21 Nov 2024, 09:03

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: powercap: intel_rapl: corrige una desreferencia de puntero NULL Se activa una desreferencia de puntero NULL al probar el controlador MMIO RAPL en plataformas con ID de CPU que no figuran en la lista de modelos de CPU intel_rapl_common. Esto se debe a que el módulo intel_rapl_common aún sondea en dichas plataformas incluso si 'defaults_msr' no está configurado después de confirmar 1488ac990ac8 ("powercap: intel_rapl: Permitir sondeo sin coincidencia de CPUID"). Por lo tanto, MMIO RAPL rp->priv->defaults es NULL cuando se registra en el marco RAPL. Solucione el problema agregando una verificación de cordura para garantizar que rp->priv->rapl_defaults siempre sea válido.
References () https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78 - () https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78 -
References () https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e - () https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e -
References () https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6 - () https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6 -
References () https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1 - () https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1 -

01 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 06:15

Updated : 2024-12-23 14:02


NVD link : CVE-2024-26975

Mitre link : CVE-2024-26975

CVE.ORG link : CVE-2024-26975


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference