CVE-2022-48730

In the Linux kernel, the following vulnerability has been resolved: dma-buf: heaps: Fix potential spectre v1 gadget It appears like nr could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using array_index_nospec. [sumits: added fixes and cc: stable tags]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*

History

06 Jan 2025, 21:33

Type Values Removed Values Added
CWE CWE-203
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e - () https://git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e - Patch
References () https://git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a - () https://git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a - Patch
References () https://git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d - () https://git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d - Patch
References () https://git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed - () https://git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed - Patch

Information

Published : 2024-06-20 12:15

Updated : 2025-01-06 21:33


NVD link : CVE-2022-48730

Mitre link : CVE-2022-48730

CVE.ORG link : CVE-2022-48730


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-203

Observable Discrepancy