CVE-2022-2196

Source
https://cve.org/CVERecord?id=CVE-2022-2196
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2196.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-2196
Downstream
Related
Published
2023-01-09T11:15:10.583Z
Modified
2026-03-15T22:43:35.694468Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2196.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "5.4.47"
            },
            {
                "fixed": "5.4.233"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.6.19"
            },
            {
                "fixed": "5.7"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.7.3"
            },
            {
                "fixed": "5.10.170"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.11"
            },
            {
                "fixed": "5.15.96"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.16"
            },
            {
                "fixed": "6.1.14"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "10.0"
            }
        ]
    }
]