In the Linux kernel, the following vulnerability has been resolved:
dma-buf: heaps: Fix potential spectre v1 gadget
It appears like nr could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using arrayindexnospec.
[sumits: added fixes and cc: stable tags]
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/dma-buf/dma-heap.c", "function": "dma_heap_ioctl" }, "deprecated": false, "digest": { "length": 1048.0, "function_hash": "286713757498017438604001811428641270626" }, "id": "CVE-2022-48730-04037ec4", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@24f8e12d965b24f8aea762589e0e9fe2025c005e" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/dma-buf/dma-heap.c", "function": "dma_heap_ioctl" }, "deprecated": false, "digest": { "length": 1048.0, "function_hash": "286713757498017438604001811428641270626" }, "id": "CVE-2022-48730-0cef8510", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/dma-buf/dma-heap.c" }, "deprecated": false, "digest": { "line_hashes": [ "47945987605112108888428681970823575191", "68429015698352824297158460859584013360", "276600609892156343450926796323703085111", "270543084158467361761838070722084147375", "259338825670454522772811979125523842693", "56044046210453101280774016513601854910", "269130342320155388030271724028011673058" ], "threshold": 0.9 }, "id": "CVE-2022-48730-493b59d4", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/dma-buf/dma-heap.c", "function": "dma_heap_ioctl" }, "deprecated": false, "digest": { "length": 1048.0, "function_hash": "286713757498017438604001811428641270626" }, "id": "CVE-2022-48730-79fd4236", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/dma-buf/dma-heap.c" }, "deprecated": false, "digest": { "line_hashes": [ "47945987605112108888428681970823575191", "68429015698352824297158460859584013360", "276600609892156343450926796323703085111", "270543084158467361761838070722084147375", "259338825670454522772811979125523842693", "56044046210453101280774016513601854910", "269130342320155388030271724028011673058" ], "threshold": 0.9 }, "id": "CVE-2022-48730-7b211a8e", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/dma-buf/dma-heap.c", "function": "dma_heap_ioctl" }, "deprecated": false, "digest": { "length": 1048.0, "function_hash": "286713757498017438604001811428641270626" }, "id": "CVE-2022-48730-84ff2def", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@92c4cfaee6872038563c5b6f2e8e613f9d84d47d" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/dma-buf/dma-heap.c" }, "deprecated": false, "digest": { "line_hashes": [ "47945987605112108888428681970823575191", "68429015698352824297158460859584013360", "276600609892156343450926796323703085111", "270543084158467361761838070722084147375", "259338825670454522772811979125523842693", "56044046210453101280774016513601854910", "269130342320155388030271724028011673058" ], "threshold": 0.9 }, "id": "CVE-2022-48730-a1555d48", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@92c4cfaee6872038563c5b6f2e8e613f9d84d47d" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/dma-buf/dma-heap.c" }, "deprecated": false, "digest": { "line_hashes": [ "47945987605112108888428681970823575191", "68429015698352824297158460859584013360", "276600609892156343450926796323703085111", "270543084158467361761838070722084147375", "259338825670454522772811979125523842693", "56044046210453101280774016513601854910", "269130342320155388030271724028011673058" ], "threshold": 0.9 }, "id": "CVE-2022-48730-e9fde813", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@24f8e12d965b24f8aea762589e0e9fe2025c005e" } ] }