In the Linux kernel, the following vulnerability has been resolved:
powercap: intel_rapl: Fix off by one in get_rpi()
The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have
NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >=
to prevent an off by one access.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-10-21 13:15
Updated : 2024-10-23 16:53
NVD link : CVE-2024-49862
Mitre link : CVE-2024-49862
CVE.ORG link : CVE-2024-49862
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-193
Off-by-one Error