VYPR
High severity7.1NVD Advisory· Published Sep 26, 2017· Updated May 13, 2026

CVE-2017-12154

CVE-2017-12154

Description

The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Insufficient CR8 control validation in KVM nested virtualization allows L2 guests to read/write the host CR8 register, leading to potential denial of service.

Vulnerability

The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through version 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls are present when the L1 hypervisor omits the "use TPR shadow" vmcs12 control. This occurs in nested virtualization (nVMX) scenarios, allowing KVM L2 guest OS users to access the hardware CR8 register.

Exploitation

An attacker must have access to a KVM L2 guest and the L1 hypervisor must omit the "use TPR shadow" control in the vmcs12. Under these conditions, the L2 guest can perform read and write operations on the hardware CR8 register without proper restriction.

Impact

A local attacker within the L2 guest can read and write the hardware CR8 register, potentially leading to a denial of service (system crash) as reported in the Ubuntu advisory [4]. The vulnerability may also enable further attacks depending on system configuration.

Mitigation

Patches are available in updated kernel packages. For Red Hat Enterprise Linux, updates are provided via RHSA-2018:1062 [1] and RHSA-2019:1946 [2]. Ubuntu has released fixed kernel versions in USN-3698-1 [4]. Users should upgrade their kernel to the latest version to mitigate this vulnerability.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

57

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.