CVE-2023-53208Always-Incorrect Control Flow Implementation in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state When emulating nested VM-Exit, load L1's TSC multiplier if L1's desired ratio doesn't match the current ratio, not if the ratio L1 is using for L2 diverges from the default. Functionally, the end result is the same as KVM will run L2 with L1's multiplier if L2's multiplier is the default, i.e. checking that L1's multiplier is loaded is equivalent to checking i

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.166.1.54+1
Debianlinux/linux_kernel< 6.1.55-1+2
CVEListV5linux/linux5228eb96a4875f8cf5d61d486e3795ac14df89045b2b0535fa7adee7e295fed0a3095082131a8d05+3
debiandebian/linux< linux 6.1.55-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53208: In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state When emulating2025-09-15
GHSA
GHSA-2h47-q9f6-8gx7: In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state When emulati2025-09-15

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel KVM: Denial of Service in nested SVM due to TSC multiplier manipulation2025-09-15
Debian
CVE-2023-53208: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: ...2023
CVE-2023-53208 — Linux vulnerability | cvebase