In the Linux kernel, the following vulnerability has been resolved:
powercap: intelrapl: Fix off by one in getrpi()
The rp->priv->rpi array is either rpimsr or rpitpmi which have NRRAPLPRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49862.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49862.json"
[
{
"signature_version": "v1",
"target": {
"file": "drivers/powercap/intel_rapl_common.c",
"function": "get_rpi"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95f6580352a7225e619551febb83595bcb77ab17",
"deprecated": false,
"digest": {
"function_hash": "809733372948056867797609301900599159",
"length": 191.0
},
"id": "CVE-2024-49862-405148f8",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "drivers/powercap/intel_rapl_common.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95f6580352a7225e619551febb83595bcb77ab17",
"deprecated": false,
"digest": {
"line_hashes": [
"81327422020284749373744118059573018223",
"9766821139007772029064406913515633601",
"143063654730586804918457177604566748433",
"181139755430746042912916942563736809427"
],
"threshold": 0.9
},
"id": "CVE-2024-49862-59527cbc",
"signature_type": "Line"
}
]