{"vulnerability": "CVE-2024-46774", "sightings": [{"uuid": "945d1d40-8cd5-45eb-a2c1-4a96f3d24460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46774", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13403", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-46774\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()\n\nSmatch warns:\n\n  arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() warn: potential\n  spectre issue 'args.args' [r] (local cap)\n\nThe 'nargs' and 'nret' locals come directly from a user-supplied\nbuffer and are used as indexes into a small stack-based array and as\ninputs to copy_to_user() after they are subject to bounds checks.\n\nUse array_index_nospec() after the bounds checks to clamp these values\nfor speculative execution.\n\ud83d\udccf Published: 2024-09-18T07:12:31.782Z\n\ud83d\udccf Modified: 2025-04-25T10:06:39.437Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/b137af795399d8b657bad1646c18561530f35ed1\n2. https://git.kernel.org/stable/c/1f1feff02e9da0dd0cdb195c428c42b5f9b6c771\n3. https://git.kernel.org/stable/c/68d8156480940b79227d58865ec5d2947b9384a8\n4. https://git.kernel.org/stable/c/0974d03eb479384466d828d65637814bee6b26d7", "creation_timestamp": "2025-04-25T11:07:48.000000Z"}, {"uuid": "f7ba8e05-d67a-41af-86f9-9a20293e6bed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46774", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}]}