In the Linux kernel, the following vulnerability has been resolved:
dma-buf: heaps: Fix potential spectre v1 gadget
It appears like nr could be a Spectre v1 gadget as it’s supplied by a
user and used as an array index. Prevent the contents
of kernel memory from being leaked to userspace via speculative
execution by using array_index_nospec.
[sumits: added fixes and cc: stable tags]
git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e
git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a
git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d
git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed
security-tracker.debian.org/tracker/CVE-2022-48730