-

CVE-2022-50366

In the Linux kernel, the following vulnerability has been resolved:

powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue

When value < time_unit, the parameter of ilog2() will be zero and
the return value is -1. u64(-1) is too large for shift exponent
and then will trigger shift-out-of-bounds:

shift exponent 18446744073709551615 is too large for 32-bit type 'int'
Call Trace:
 rapl_compute_time_window_core
 rapl_write_data_raw
 set_time_window
 store_constraint_time_window_us

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 42f79dbb9514f726ff21df25f09cb0693b0b2445
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 3eb0ba70376f6ee40fa843fc9cee49269370b0b3
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 4ebba43384722adbd325baec3a12c572d94488eb
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 49a6ffdaed60f0eb52c198fafebc05994e16e305
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 708b9abe1b4a2f050a483db4b7edfc446b13df1f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 139bbbd01114433b80fe59f5e1330615aadf9752
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 6216b685b8f48ab7b721a6fd5acbf526b41c13e8
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1d94af37565e4d3c26b0d63428e093a37d5b4c32
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2d93540014387d1c73b9ccc4d7895320df66d01b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.127
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string