摘要:
In the Linux kernel, the following vulnerability has been resolved:
powercap: intel_rapl: Fix a NULL pointer dereference
A NULL pointer dereference is triggered when probing the MMIO RAPL
driver on platforms with CPU ID not listed in intel_rapl_common CPU
model list.
This is because the intel_rapl_common module still probes on such
platforms even if 'defaults_msr' is not set after commit 1488ac990ac8
("powercap: intel_rapl: Allow probing without CPUID match"). Thus the
MMIO RAPL rp->priv->defaults is NULL when registering to RAPL framework.
Fix the problem by adding sanity check to ensure rp->priv->rapl_defaults
is always valid.
安全等级: Low
公告ID: KylinSec-SA-2024-2103
发布日期: 2024年5月28日
关联CVE: CVE-2024-26975
In the Linux kernel, the following vulnerability has been resolved:
powercap: intel_rapl: Fix a NULL pointer dereference
A NULL pointer dereference is triggered when probing the MMIO RAPL
driver on platforms with CPU ID not listed in intel_rapl_common CPU
model list.
This is because the intel_rapl_common module still probes on such
platforms even if 'defaults_msr' is not set after commit 1488ac990ac8
("powercap: intel_rapl: Allow probing without CPUID match"). Thus the
MMIO RAPL rp->priv->defaults is NULL when registering to RAPL framework.
Fix the problem by adding sanity check to ensure rp->priv->rapl_defaults
is always valid.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-26975 | KY3.4-4A | kernel | Unaffected |
CVE-2024-26975 | KY3.4-5 | kernel | Unaffected |
CVE-2024-26975 | KY3.5.1 | kernel | Unaffected |
CVE-2024-26975 | KY3.5.3 | kernel | Unaffected |
CVE-2024-26975 | V6 | kernel | Unaffected |