Vulnerability Description
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.4.47, < 5.4.233 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2eMailing ListPatchVendor Advisory
- https://kernel.dance/#2e7eab81425aPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/05/msg00005.htmlMailing ListThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2eMailing ListPatchVendor Advisory
- https://kernel.dance/#2e7eab81425aPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/05/msg00005.htmlMailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20230223-0002/
FAQ
What is CVE-2022-2196?
CVE-2022-2196 is a vulnerability with a CVSS score of 5.8 (MEDIUM). A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB...
How severe is CVE-2022-2196?
CVE-2022-2196 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2196?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.