Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5j5v-66r8-4gm4

Опубликовано: 21 окт. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.1

Описание

In the Linux kernel, the following vulnerability has been resolved:

powercap: intel_rapl: Fix off by one in get_rpi()

The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

In the Linux kernel, the following vulnerability has been resolved:

powercap: intel_rapl: Fix off by one in get_rpi()

The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

EPSS

Процентиль: 14%
0.00047
Низкий

7.1 High

CVSS3

Дефекты

CWE-193

Связанные уязвимости

CVSS3: 7.1
ubuntu
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
redhat
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
nvd
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.1
debian
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: p ...

EPSS

Процентиль: 14%
0.00047
Низкий

7.1 High

CVSS3

Дефекты

CWE-193