In the Linux kernel, the following vulnerability has been resolved:
dma-buf: heaps: Fix potential spectre v1 gadget
It appears like nr could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using arrayindexnospec.
[sumits: added fixes and cc: stable tags]
[
{
"digest": {
"function_hash": "286713757498017438604001811428641270626",
"length": 1048.0
},
"target": {
"function": "dma_heap_ioctl",
"file": "drivers/dma-buf/dma-heap.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@24f8e12d965b24f8aea762589e0e9fe2025c005e",
"signature_version": "v1",
"id": "CVE-2022-48730-04037ec4"
},
{
"digest": {
"function_hash": "286713757498017438604001811428641270626",
"length": 1048.0
},
"target": {
"function": "dma_heap_ioctl",
"file": "drivers/dma-buf/dma-heap.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed",
"signature_version": "v1",
"id": "CVE-2022-48730-0cef8510"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"47945987605112108888428681970823575191",
"68429015698352824297158460859584013360",
"276600609892156343450926796323703085111",
"270543084158467361761838070722084147375",
"259338825670454522772811979125523842693",
"56044046210453101280774016513601854910",
"269130342320155388030271724028011673058"
]
},
"target": {
"file": "drivers/dma-buf/dma-heap.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a",
"signature_version": "v1",
"id": "CVE-2022-48730-493b59d4"
},
{
"digest": {
"function_hash": "286713757498017438604001811428641270626",
"length": 1048.0
},
"target": {
"function": "dma_heap_ioctl",
"file": "drivers/dma-buf/dma-heap.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a",
"signature_version": "v1",
"id": "CVE-2022-48730-79fd4236"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"47945987605112108888428681970823575191",
"68429015698352824297158460859584013360",
"276600609892156343450926796323703085111",
"270543084158467361761838070722084147375",
"259338825670454522772811979125523842693",
"56044046210453101280774016513601854910",
"269130342320155388030271724028011673058"
]
},
"target": {
"file": "drivers/dma-buf/dma-heap.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed",
"signature_version": "v1",
"id": "CVE-2022-48730-7b211a8e"
},
{
"digest": {
"function_hash": "286713757498017438604001811428641270626",
"length": 1048.0
},
"target": {
"function": "dma_heap_ioctl",
"file": "drivers/dma-buf/dma-heap.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@92c4cfaee6872038563c5b6f2e8e613f9d84d47d",
"signature_version": "v1",
"id": "CVE-2022-48730-84ff2def"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"47945987605112108888428681970823575191",
"68429015698352824297158460859584013360",
"276600609892156343450926796323703085111",
"270543084158467361761838070722084147375",
"259338825670454522772811979125523842693",
"56044046210453101280774016513601854910",
"269130342320155388030271724028011673058"
]
},
"target": {
"file": "drivers/dma-buf/dma-heap.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@92c4cfaee6872038563c5b6f2e8e613f9d84d47d",
"signature_version": "v1",
"id": "CVE-2022-48730-a1555d48"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"47945987605112108888428681970823575191",
"68429015698352824297158460859584013360",
"276600609892156343450926796323703085111",
"270543084158467361761838070722084147375",
"259338825670454522772811979125523842693",
"56044046210453101280774016513601854910",
"269130342320155388030271724028011673058"
]
},
"target": {
"file": "drivers/dma-buf/dma-heap.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@24f8e12d965b24f8aea762589e0e9fe2025c005e",
"signature_version": "v1",
"id": "CVE-2022-48730-e9fde813"
}
]