In the Linux kernel, the following vulnerability has been resolved:
dma-buf: heaps: Fix potential spectre v1 gadget It appears like nr could be
a Spectre v1 gadget as it’s supplied by a user and used as an array index.
Prevent the contents of kernel memory from being leaked to userspace via
speculative execution by using array_index_nospec. [sumits: added fixes and
cc: stable tags]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux-intel-iotg-5.15 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-raspi | < any | UNKNOWN |
git.kernel.org/linus/92c4cfaee6872038563c5b6f2e8e613f9d84d47d (5.17-rc3)
git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e
git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a
git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d
git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed
launchpad.net/bugs/cve/CVE-2022-48730
nvd.nist.gov/vuln/detail/CVE-2022-48730
security-tracker.debian.org/tracker/CVE-2022-48730
www.cve.org/CVERecord?id=CVE-2022-48730