CVE-2023-53208
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.16 (inc) to 6.1.54 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.5.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's KVM (Kernel-based Virtual Machine) nested virtualization feature for AMD processors. Specifically, it concerns how the Time Stamp Counter (TSC) multiplier for the first-level guest (L1) is loaded during nested VM exits. The issue arises because the kernel incorrectly assumes that TSC scaling is exposed to L1, but userspace can trigger warnings by manipulating model-specific registers (MSRs) and guest CPUID features. This can lead to repeated warnings and subtle behavior in KVM's handling of TSC multipliers during nested virtualization.
How can this vulnerability impact me? :
The vulnerability can cause repeated warnings and potentially unstable or unexpected behavior in nested virtualization environments using KVM on AMD processors. This may affect the reliability and performance of virtual machines running nested guests, but there is no indication of direct security compromise such as privilege escalation or data leakage.