CVE-2024-46774
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
18/09/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()<br />
<br />
Smatch warns:<br />
<br />
arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() warn: potential<br />
spectre issue &#39;args.args&#39; [r] (local cap)<br />
<br />
The &#39;nargs&#39; and &#39;nret&#39; locals come directly from a user-supplied<br />
buffer and are used as indexes into a small stack-based array and as<br />
inputs to copy_to_user() after they are subject to bounds checks.<br />
<br />
Use array_index_nospec() after the bounds checks to clamp these values<br />
for speculative execution.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10.10 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0974d03eb479384466d828d65637814bee6b26d7
- https://git.kernel.org/stable/c/1f1feff02e9da0dd0cdb195c428c42b5f9b6c771
- https://git.kernel.org/stable/c/68d8156480940b79227d58865ec5d2947b9384a8
- https://git.kernel.org/stable/c/a262c2dc833f2fe1bd5c53a4d899e7077d3b1da9
- https://git.kernel.org/stable/c/b137af795399d8b657bad1646c18561530f35ed1
- https://git.kernel.org/stable/c/d2834ff1d9641a8695a09ea79cd901c7b6d4d05f
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



