Impact
A regression in the Linux kernel's Apple Silicon SMC hardware‑monitor driver caused the voltage sensor population loop to use an incorrect prefix and to misplace voltage sensors into the temperature sensor array, triggering out‑of‑bounds memory accesses or data corruption when both sensor types were present. Additionally, the float conversion routine contained flawed exponent logic for large values and omitted mantissa masking, leading to incorrect values written to the SMC. These flaws could allow an attacker to corrupt kernel memory or supply inaccurate fan‑control data, potentially affecting system stability or privilege escalation.
Affected Systems
The issue is confined to Linux kernels that include the macsmc‑hwmon driver for Apple Silicon. Versions of the kernel that contain the new driver code—identified by the commit references in the advisory—are affected. The problem does not affect non‑Apple Silicon platforms or kernels lacking the macsmc driver.
Risk and Exploitability
The CVSS score is not disclosed, but the EPSS probability is reported as less than 1 % and the vulnerability is not listed in CISA’s KEV catalog, indicating a low but non‑negligible exploitation risk. The attack vector is likely local or requires interaction with the sensor subsystem; it would require an attacker to trigger the flawed sensor population or write logic, which is feasible for a local user with kernel access or through an application that can invoke the hwmon interface. Because the flaw involves kernel memory corruption, exploitation could lead to privilege escalation if successfully executed.
OpenCVE Enrichment