In the Linux kernel, the following vulnerability has been resolved: dma-buf: heaps: Fix potential spectre v1 gadget It appears like nr could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using arrayindexnospec. [sumits: added fixes and cc: stable tags]
{ "availability": "No subscription required", "binaries": [ { "binary_name": "linux-buildinfo-5.15.0-1008-intel-iotg", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-cloud-tools-5.15.0-1008-intel-iotg", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-headers-5.15.0-1008-intel-iotg", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1008-intel-iotg", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-image-unsigned-5.15.0-1008-intel-iotg-dbgsym", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1008", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-cloud-tools-common", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1008", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1008", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-common", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-intel-iotg-5.15-tools-host", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-modules-5.15.0-1008-intel-iotg", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-modules-extra-5.15.0-1008-intel-iotg", "binary_version": "5.15.0-1008.11~20.04.1" }, { "binary_name": "linux-tools-5.15.0-1008-intel-iotg", "binary_version": "5.15.0-1008.11~20.04.1" } ] }