CVE-2022-2196

A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
Summary
  • (es) Existe una regresión en el kernel de Linux dentro de KVM: nVMX que permitió ataques de ejecución especulativa. L2 puede llevar a cabo ataques Spectre v2 en L1 debido a que L1 piensa que no necesita retpolines o IBPB después de ejecutar L2 debido a que KVM (L0) anuncia soporte eIBRS en L1. Un atacante en L2 con ejecución de código puede ejecutar código en una rama indirecta en la máquina host. Recomendamos actualizar al Kernel 6.2 o al commit anterior 2e7eab81425a
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 5.8
References
  • () https://security.netapp.com/advisory/ntap-20230223-0002/ -
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5 - Mailing List, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5 - Mailing List, Patch, Vendor Advisory
References () https://kernel.dance/#2e7eab81425a - Patch, Third Party Advisory () https://kernel.dance/#2e7eab81425a - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html - Mailing List, Third Party Advisory

18 Aug 2023, 18:56

Type Values Removed Values Added
References (MISC) https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html - (MISC) https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html - Mailing List, Third Party Advisory
First Time Debian
Debian debian Linux
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Information

Published : 2023-01-09 11:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2196

Mitre link : CVE-2022-2196

CVE.ORG link : CVE-2022-2196


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-1188

Insecure Default Initialization of Resource