A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3404-1 | linux-5.10 security update |
EUVD |
EUVD-2022-34479 | A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a |
Ubuntu USN |
USN-5970-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5976-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5977-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5978-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5979-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-5980-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5982-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5985-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5987-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6004-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6020-1 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6151-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a | A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T16:28:57.097Z
Reserved: 2022-06-24T13:29:09.969Z
Link: CVE-2022-2196
Updated: 2024-08-03T00:32:08.645Z
Status : Modified
Published: 2023-01-09T11:15:10.583
Modified: 2025-02-13T17:15:40.357
Link: CVE-2022-2196
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN