CVE-2022-48730

In the Linux kernel, the following vulnerability has been resolved: dma-buf: heaps: Fix potential spectre v1 gadget It appears like nr could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using array_index_nospec. [sumits: added fixes and cc: stable tags]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*

History

06 Jan 2025, 21:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
CWE CWE-203
References () https://git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e - () https://git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e - Patch
References () https://git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a - () https://git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a - Patch
References () https://git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d - () https://git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d - Patch
References () https://git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed - () https://git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed - Patch
First Time Linux linux Kernel
Linux

21 Nov 2024, 07:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e - () https://git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e -
References () https://git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a - () https://git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a -
References () https://git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d - () https://git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d -
References () https://git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed - () https://git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dma-buf: heaps: repara un posible gadget de Spectre v1. Parece que nr podría ser un gadget de Spectre v1, ya que lo proporciona un usuario y se utiliza como índice de matriz. Evite que el contenido de la memoria del kernel se filtre al espacio de usuario mediante ejecución especulativa utilizando array_index_nospec. [presenta: correcciones agregadas y cc: etiquetas estables]

20 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 12:15

Updated : 2025-01-06 21:33


NVD link : CVE-2022-48730

Mitre link : CVE-2022-48730

CVE.ORG link : CVE-2022-48730


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-203

Observable Discrepancy