In the Linux kernel, the following vulnerability has been resolved:
powercap: intelrapl: Fix off by one in getrpi()
The rp->priv->rpi array is either rpimsr or rpitpmi which have NRRAPLPRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.
{ "vanir_signatures": [ { "digest": { "length": 191.0, "function_hash": "809733372948056867797609301900599159" }, "target": { "function": "get_rpi", "file": "drivers/powercap/intel_rapl_common.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@851e7f7f14a15f4e47b7d0f70d5c4a2b95b824d6", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-49862-4a409945" }, { "digest": { "line_hashes": [ "81327422020284749373744118059573018223", "9766821139007772029064406913515633601", "143063654730586804918457177604566748433", "181139755430746042912916942563736809427" ], "threshold": 0.9 }, "target": { "file": "drivers/powercap/intel_rapl_common.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@851e7f7f14a15f4e47b7d0f70d5c4a2b95b824d6", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-49862-dc43a7b1" } ] }