CVE-2024-49862

high

Description

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

References

https://git.kernel.org/stable/c/95f6580352a7225e619551febb83595bcb77ab17

https://git.kernel.org/stable/c/851e7f7f14a15f4e47b7d0f70d5c4a2b95b824d6

https://git.kernel.org/stable/c/6a34f3b0d7f11fb6ed72da315fd2360abd9c0737

https://git.kernel.org/stable/c/288cbc505e2046638c615c36357cb78bc9fee1e0

Details

Source: Mitre, NVD

Published: 2024-10-21

Updated: 2024-10-23

Risk Information

CVSS v2

Base Score: 6.2

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High