Логотип exploitDog
bind:CVE-2024-49862
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-49862

Количество 13

Количество 13

ubuntu логотип

CVE-2024-49862

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2024-49862

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2024-49862

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
EPSS: Низкий
msrc логотип

CVE-2024-49862

7 месяцев назад

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2024-49862

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-5j5v-66r8-4gm4

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2025-00159

10 месяцев назад

Уязвимость функции get_rpi() в модуле drivers/powercap/intel_rapl_common.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

CVSS3: 7.1
EPSS: Низкий
redos логотип

ROS-20250312-01

3 месяца назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3986-1

7 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3984-1

7 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2025-6966

около 1 месяца назад

ELSA-2025-6966: kernel security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4387-1

6 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4318-1

6 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-49862

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
0%
Низкий
8 месяцев назад
redhat логотип
CVE-2024-49862

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
0%
Низкий
8 месяцев назад
nvd логотип
CVE-2024-49862

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
0%
Низкий
8 месяцев назад
msrc логотип
CVSS3: 7.1
0%
Низкий
7 месяцев назад
debian логотип
CVE-2024-49862

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.1
0%
Низкий
8 месяцев назад
github логотип
GHSA-5j5v-66r8-4gm4

In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.

CVSS3: 7.1
0%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-00159

Уязвимость функции get_rpi() в модуле drivers/powercap/intel_rapl_common.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

CVSS3: 7.1
0%
Низкий
10 месяцев назад
redos логотип
ROS-20250312-01

Множественные уязвимости kernel-lt

CVSS3: 7.8
3 месяца назад
suse-cvrf логотип
SUSE-SU-2024:3986-1

Security update for the Linux Kernel

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3984-1

Security update for the Linux Kernel

7 месяцев назад
oracle-oval логотип
ELSA-2025-6966

ELSA-2025-6966: kernel security update (MODERATE)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2024:4387-1

Security update for the Linux Kernel

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4318-1

Security update for the Linux Kernel

6 месяцев назад

Уязвимостей на страницу