In the Linux kernel, the following vulnerability has been resolved:
dma-buf: heaps: Fix potential spectre v1 gadget
It appears like nr could be a Spectre v1 gadget as it's supplied by a
user and used as an array index. Prevent the contents
of kernel memory from being leaked to userspace via speculative
execution by using array_index_nospec.
[sumits: added fixes and cc: stable tags]
References
Configurations
Configuration 1 (hide)
|
History
06 Jan 2025, 21:33
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:* |
|
CWE | CWE-203 | |
References | () https://git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e - Patch | |
References | () https://git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a - Patch | |
References | () https://git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d - Patch | |
References | () https://git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed - Patch | |
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 07:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e - | |
References | () https://git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a - | |
References | () https://git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d - | |
References | () https://git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed - | |
Summary |
|
20 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-20 12:15
Updated : 2025-01-06 21:33
NVD link : CVE-2022-48730
Mitre link : CVE-2022-48730
CVE.ORG link : CVE-2022-48730
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-203
Observable Discrepancy