CVE-2023-53756
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's KVM module involves a crash caused by the use of an uninitialized variable called current_vmcs. When running as a nested hypervisor on top of Hyper-V, the function evmcs_touch_msr_bitmap uses current_vmcs to mark changes to the MSR bitmap. However, current_vmcs is not properly initialized, and the code may incorrectly write to memory left by another task. Because preemption is not disabled, the current task can be moved to another CPU while current_vmcs is accessed multiple times, leading to a kernel crash due to a NULL pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when using KVM as a nested hypervisor on Hyper-V, leading to system instability or denial of service. The crash occurs due to improper handling of the MSR bitmap and uninitialized current_vmcs variable, which may disrupt virtual machine operations and affect system reliability.