CVE-2023-53996
Description
In the Linux kernel, the following vulnerability has been resolved:
x86/sev: Make enc_dec_hypercall() accept a size instead of npages
enc_dec_hypercall() accepted a page count instead of a size, which forced its callers to round up. As a result, non-page aligned vaddrs caused pages to be spuriously marked as decrypted via the encryption status hypercall, which in turn caused consistent corruption of pages during live migration. Live migration requires accurate encryption status information to avoid migrating pages from the wrong perspective.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A Linux kernel bug in SEV's enc_dec_hypercall() allowed non-page-aligned vaddrs to corrupt live migration due to spurious decryption marking.
Root
Cause
The vulnerability resides in the Linux kernel's SEV (Secure Encrypted Virtualization) code. The function enc_dec_hypercall() accepted a page count (npages) instead of a byte size, forcing callers to round up their requests. When a virtual address (vaddr) was not page-aligned, the rounding caused pages that should remain encrypted to be marked as decrypted via the encryption status hypercall. [1]
Exploitation
An attacker with access to the hypervisor or migration infrastructure could trigger this bug during live migration. No special privileges on the guest are required; the flaw is in the kernel's handling of memory encryption status updates. As the official description states, 'non-page aligned vaddrs caused pages to be spuriously marked as decrypted via the encryption status hypercall.' [1]
Impact
The spurious decryption marking leads to 'consistent corruption of pages during live migration.' Live migration relies on accurate encryption status to transfer pages from the correct perspective (encrypted vs. decrypted). Any mismatch results in data corruption, potentially causing guest crashes or data leaks. [1]
Mitigation
The fix changes enc_dec_hypercall() to accept a size instead of a page count, ensuring correct handling for non-page-aligned addresses. The patch was committed to the stable kernel tree. Users should apply the update to prevent migration-induced corruption. [1]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
4ba50e7773a996615212d8e138ae7457e71a3ac3f9c9f1b37Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.