Description
In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.
References (4)
Scores
CVSS v3
7.1
EPSS
0.0004
EPSS Percentile
10.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-193
Status
published
Products (4)
linux/Kernel
6.11.0 - 6.11.2linux
linux/Kernel
6.5.0 - 6.6.54linux
linux/Kernel
6.7.0 - 6.10.13linux
linux/linux_kernel
6.5 - 6.6.54
Published
Oct 21, 2024
Tracked Since
Feb 18, 2026