CVE-2026-43483
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/05/2026
Last modified:
13/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
KVM: SVM: Set/clear CR8 write interception when AVIC is (de)activated<br />
<br />
Explicitly set/clear CR8 write interception when AVIC is (de)activated to<br />
fix a bug where KVM leaves the interception enabled after AVIC is<br />
activated. E.g. if KVM emulates INIT=>WFS while AVIC is deactivated, CR8<br />
will remain intercepted in perpetuity.<br />
<br />
On its own, the dangling CR8 intercept is "just" a performance issue, but<br />
combined with the TPR sync bug fixed by commit d02e48830e3f ("KVM: SVM:<br />
Sync TPR from LAPIC into VMCB::V_TPR even if AVIC is active"), the danging<br />
intercept is fatal to Windows guests as the TPR seen by hardware gets<br />
wildly out of sync with reality.<br />
<br />
Note, VMX isn&#39;t affected by the bug as TPR_THRESHOLD is explicitly ignored<br />
when Virtual Interrupt Delivery is enabled, i.e. when APICv is active in<br />
KVM&#39;s world. I.e. there&#39;s no need to trigger update_cr8_intercept(), this<br />
is firmly an SVM implementation flaw/detail.<br />
<br />
WARN if KVM gets a CR8 write #VMEXIT while AVIC is active, as KVM should<br />
never enter the guest with AVIC enabled and CR8 writes intercepted.<br />
<br />
[Squash fix to avic_deactivate_vmcb. - Paolo]
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/01651e7751edbbc0fb4598f8367a3dabcfc8c182
- https://git.kernel.org/stable/c/737410b32bd615b321da4fbeda490351b9af5e8b
- https://git.kernel.org/stable/c/816fa1dfae4532e851b1fe6b2434c753ecbd86c7
- https://git.kernel.org/stable/c/87d0f901a9bd8ae6be57249c737f20ac0cace93d
- https://git.kernel.org/stable/c/a4123fe5d9122eef9852e4921f7cc463420f30d4
- https://git.kernel.org/stable/c/ba3bca40f9f25c053f69413e5f4a41dd0fd762bf



