CVE-2023-53996 — Buffer Access with Incorrect Length Value in Linux
Severity
5.7MEDIUM
No vectorEPSS
0.0%
top 96.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
x86/sev: Make enc_dec_hypercall() accept a size instead of npages
enc_dec_hypercall() accepted a page count instead of a size, which
forced its callers to round up. As a result, non-page aligned
vaddrs caused pages to be spuriously marked as decrypted via the
encryption status hypercall, which in turn caused consistent
corruption of pages during live migration. Live migration requires
accurate encryption status information to …
Affected Packages4 packages
▶CVEListV5linux/linux064ce6c550a0630789978bfec7a13ab2bd1bdcdf — ba50e7773a99a109a1ea6f753b766a080d3b21cc+4
🔴Vulnerability Details
3OSV▶
CVE-2023-53996: In the Linux kernel, the following vulnerability has been resolved: x86/sev: Make enc_dec_hypercall() accept a size instead of npages enc_dec_hypercal↗2025-12-24
GHSA▶
GHSA-5899-4q59-gc9f: In the Linux kernel, the following vulnerability has been resolved:
x86/sev: Make enc_dec_hypercall() accept a size instead of npages
enc_dec_hyperc↗2025-12-24