In the Linux kernel, the following vulnerability has been resolved: dma-buf: heaps: Fix potential spectre v1 gadget It appears like nr could be a Spectre v1 gadget as it’s supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using array_index_nospec. [sumits: added fixes and cc: stable tags]
git.kernel.org/linus/92c4cfaee6872038563c5b6f2e8e613f9d84d47d
git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e
git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a
git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d
git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed
ubuntu.com/security/CVE-2022-48730
www.cve.org/CVERecord?id=CVE-2022-48730