CVE-2023-53996Buffer Access with Incorrect Length Value in Linux

Severity
5.7MEDIUM
No vector
EPSS
0.0%
top 96.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: x86/sev: Make enc_dec_hypercall() accept a size instead of npages enc_dec_hypercall() accepted a page count instead of a size, which forced its callers to round up. As a result, non-page aligned vaddrs caused pages to be spuriously marked as decrypted via the encryption status hypercall, which in turn caused consistent corruption of pages during live migration. Live migration requires accurate encryption status information to

Affected Packages4 packages

Linuxlinux/linux_kernel5.16.06.1.53+2
Debianlinux/linux_kernel< 6.1.55-1+2
CVEListV5linux/linux064ce6c550a0630789978bfec7a13ab2bd1bdcdfba50e7773a99a109a1ea6f753b766a080d3b21cc+4
debiandebian/linux< linux 6.1.55-1 (bookworm)

🔴Vulnerability Details

3
OSV
x86/sev: Make enc_dec_hypercall() accept a size instead of npages2025-12-24
OSV
CVE-2023-53996: In the Linux kernel, the following vulnerability has been resolved: x86/sev: Make enc_dec_hypercall() accept a size instead of npages enc_dec_hypercal2025-12-24
GHSA
GHSA-5899-4q59-gc9f: In the Linux kernel, the following vulnerability has been resolved: x86/sev: Make enc_dec_hypercall() accept a size instead of npages enc_dec_hyperc2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages2025-12-24
Debian
CVE-2023-53996: linux - In the Linux kernel, the following vulnerability has been resolved: x86/sev: Ma...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-53996 Impact, Exploitability, and Mitigation Steps | Wiz