{ "id": "CVE-2024-46774", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:05.180", "lastModified": "2024-09-20T12:30:51.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()\n\nSmatch warns:\n\n arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() warn: potential\n spectre issue 'args.args' [r] (local cap)\n\nThe 'nargs' and 'nret' locals come directly from a user-supplied\nbuffer and are used as indexes into a small stack-based array and as\ninputs to copy_to_user() after they are subject to bounds checks.\n\nUse array_index_nospec() after the bounds checks to clamp these values\nfor speculative execution." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/rtas: Impedir la construcci\u00f3n del gadget Spectre v1 en sys_rtas() Smatch advierte: arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() advierte: posible problema de Spectre 'args.args' [r] (cap local) Las variables locales 'nargs' y 'nret' provienen directamente de un b\u00fafer proporcionado por el usuario y se usan como \u00edndices en una peque\u00f1a matriz basada en pila y como entradas para copy_to_user() despu\u00e9s de que est\u00e9n sujetas a verificaciones de l\u00edmites. Utilice array_index_nospec() despu\u00e9s de las verificaciones de l\u00edmites para fijar estos valores para la ejecuci\u00f3n especulativa." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0974d03eb479384466d828d65637814bee6b26d7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/68d8156480940b79227d58865ec5d2947b9384a8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }