Description
The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.
References (11)
Core 11
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1491224
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:1062
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/100856
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2017/dsa-3981
Mailing List, Patch, Third Party Advisory x_refsource_confirm
https://www.spinics.net/lists/kvm/msg155414.html
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:0676
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3698-1/
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3698-2/
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:1946
Scores
CVSS v3
7.1
EPSS
0.0004
EPSS Percentile
10.7%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Details
Status
published
Products (2)
linux/linux_kernel
< 4.13.3
n/a/Linux kernel through 4.13.3
Linux kernel through 4.13.3
Published
Sep 26, 2017
Tracked Since
Feb 18, 2026