In the Linux kernel, the following vulnerability has been resolved:
xfrm/compat: prevent potential spectre v1 gadget in xfrmxlate32attr()
int type = nla_type(nla);
if (type > XFRMA_MAX) { return -EOPNOTSUPP; }
@type is then used as an array index and can be used as a Spectre v1 gadget.
if (nlalen(nla) < compatpolicy[type].len) {
arrayindexnospec() can be used to prevent leaking content of kernel memory to malicious users.