VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2023-53769

CVE-2023-53769

Description

In the Linux kernel, the following vulnerability has been resolved:

virt/coco/sev-guest: Double-buffer messages

The encryption algorithms read and write directly to shared unencrypted memory, which may leak information as well as permit the host to tamper with the message integrity. Instead, copy whole messages in or out as needed before doing any computation on them.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's SEV guest driver, encryption operations on shared unencrypted memory could leak data and allow host tampering; fixed by double-buffering messages.

Vulnerability

In the Linux kernel's SEV guest driver (virt/coco/sev-guest), encryption algorithms previously read and wrote directly to shared unencrypted memory. This design allowed the host to observe sensitive data and tamper with message integrity, undermining the confidentiality and authenticity of SEV communication [1][2][3][4].

Exploitation

The attack surface is the shared memory region between guest and host. A malicious host with control over this shared memory can exploit the lack of double-buffering to extract decrypted data or inject forged messages without detection. No guest authentication is required; the vulnerability is inherent in the direct memory access pattern.

Impact

An attacker (the host) can leak confidential guest data, such as encryption keys or secrets, and also modify the content of SEV guest messages, potentially leading to guest compromise or bypass of SEV security guarantees.

Mitigation

The fix introduces double-buffering: messages are copied into private memory before encryption/decryption operations. This ensures that only encrypted data resides in shared memory. The patch has been applied to multiple stable kernel branches via commits [1][2][3][4]. Users should update to the latest stable kernel that includes the fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.