In the Linux kernel, the following vulnerability has been resolved:
powercap: intelrapl: Fix off by one in getrpi()
The rp->priv->rpi array is either rpimsr or rpitpmi which have NRRAPLPRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.
[
{
"id": "CVE-2024-49862-405148f8",
"target": {
"file": "drivers/powercap/intel_rapl_common.c",
"function": "get_rpi"
},
"digest": {
"length": 191.0,
"function_hash": "809733372948056867797609301900599159"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95f6580352a7225e619551febb83595bcb77ab17",
"signature_version": "v1"
},
{
"id": "CVE-2024-49862-4a409945",
"target": {
"file": "drivers/powercap/intel_rapl_common.c",
"function": "get_rpi"
},
"digest": {
"length": 191.0,
"function_hash": "809733372948056867797609301900599159"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@851e7f7f14a15f4e47b7d0f70d5c4a2b95b824d6",
"signature_version": "v1"
},
{
"id": "CVE-2024-49862-59527cbc",
"target": {
"file": "drivers/powercap/intel_rapl_common.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"81327422020284749373744118059573018223",
"9766821139007772029064406913515633601",
"143063654730586804918457177604566748433",
"181139755430746042912916942563736809427"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95f6580352a7225e619551febb83595bcb77ab17",
"signature_version": "v1"
},
{
"id": "CVE-2024-49862-6b9fc75c",
"target": {
"file": "drivers/powercap/intel_rapl_common.c",
"function": "get_rpi"
},
"digest": {
"length": 191.0,
"function_hash": "809733372948056867797609301900599159"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@288cbc505e2046638c615c36357cb78bc9fee1e0",
"signature_version": "v1"
},
{
"id": "CVE-2024-49862-9c84a047",
"target": {
"file": "drivers/powercap/intel_rapl_common.c",
"function": "get_rpi"
},
"digest": {
"length": 191.0,
"function_hash": "809733372948056867797609301900599159"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a34f3b0d7f11fb6ed72da315fd2360abd9c0737",
"signature_version": "v1"
},
{
"id": "CVE-2024-49862-bc02f8e1",
"target": {
"file": "drivers/powercap/intel_rapl_common.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"81327422020284749373744118059573018223",
"9766821139007772029064406913515633601",
"143063654730586804918457177604566748433",
"181139755430746042912916942563736809427"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@288cbc505e2046638c615c36357cb78bc9fee1e0",
"signature_version": "v1"
},
{
"id": "CVE-2024-49862-c3498dfb",
"target": {
"file": "drivers/powercap/intel_rapl_common.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"81327422020284749373744118059573018223",
"9766821139007772029064406913515633601",
"143063654730586804918457177604566748433",
"181139755430746042912916942563736809427"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a34f3b0d7f11fb6ed72da315fd2360abd9c0737",
"signature_version": "v1"
},
{
"id": "CVE-2024-49862-dc43a7b1",
"target": {
"file": "drivers/powercap/intel_rapl_common.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"81327422020284749373744118059573018223",
"9766821139007772029064406913515633601",
"143063654730586804918457177604566748433",
"181139755430746042912916942563736809427"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@851e7f7f14a15f4e47b7d0f70d5c4a2b95b824d6",
"signature_version": "v1"
}
]