In the Linux kernel, the following vulnerability has been resolved: powercap: intel_rapl: Fix off by one in get_rpi() The rp->priv->rpi array is either rpi_msr or rpi_tpmi which have NR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >= to prevent an off by one access.
Product | Vendor | Version |
---|---|---|
Linux | Linux | < 5a011f889b4832aa80c2a872a5aade5c48d2756f |
Linux | Linux | < 3.11 |