| Summary | In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Set/clear CR8 write interception when AVIC is (de)activated Explicitly set/clear CR8 write interception when AVIC is (de)activated to On its own, the dangling CR8 intercept is "just" a performance issue, but Note, VMX isn't affected by the bug as TPR_THRESHOLD is explicitly ignored WARN if KVM gets a CR8 write #VMEXIT while AVIC is active, as KVM should [Squash fix to avic_deactivate_vmcb. - Paolo] |
|---|---|
| Publication Date | May 14, 2026, 1:16 a.m. |
| Registration Date | May 15, 2026, 4:21 a.m. |
| Last Update | May 14, 2026, 1:16 a.m. |