vulnerability

Red Hat: CVE-2022-2196: kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:M/Au:S/C:C/I:N/A:N)
Published
Jan 9, 2023
Added
May 15, 2023
Modified
Nov 14, 2025

Description

A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a

Solutions

no-fix-redhat-rpm-packageredhat-upgrade-kernelredhat-upgrade-kernel-rt
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.