{ "schema_version": "1.4.0", "id": "GHSA-2jv6-v65m-qjx7", "modified": "2024-12-23T15:30:46Z", "published": "2024-05-01T06:31:42Z", "aliases": [ "CVE-2024-26975" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\npowercap: intel_rapl: Fix a NULL pointer dereference\n\nA NULL pointer dereference is triggered when probing the MMIO RAPL\ndriver on platforms with CPU ID not listed in intel_rapl_common CPU\nmodel list.\n\nThis is because the intel_rapl_common module still probes on such\nplatforms even if 'defaults_msr' is not set after commit 1488ac990ac8\n(\"powercap: intel_rapl: Allow probing without CPUID match\"). Thus the\nMMIO RAPL rp->priv->defaults is NULL when registering to RAPL framework.\n\nFix the problem by adding sanity check to ensure rp->priv->rapl_defaults\nis always valid.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26975" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1" } ], "database_specific": { "cwe_ids": [ "CWE-476" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-05-01T06:15:14Z" } }