Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.5, < 6.6.54 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/288cbc505e2046638c615c36357cb78bc9fee1e0Patch
- https://git.kernel.org/stable/c/6a34f3b0d7f11fb6ed72da315fd2360abd9c0737Patch
- https://git.kernel.org/stable/c/851e7f7f14a15f4e47b7d0f70d5c4a2b95b824d6Patch
- https://git.kernel.org/stable/c/95f6580352a7225e619551febb83595bcb77ab17Patch
FAQ
What is CVE-2024-49862?
CVE-2024-49862 is a vulnerability with a CVSS score of 7.1 (HIGH). In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITI...
How severe is CVE-2024-49862?
CVE-2024-49862 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-49862?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.