VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-53996

CVE-2023-53996

Description

In the Linux kernel, the following vulnerability has been resolved:

x86/sev: Make enc_dec_hypercall() accept a size instead of npages

enc_dec_hypercall() accepted a page count instead of a size, which forced its callers to round up. As a result, non-page aligned vaddrs caused pages to be spuriously marked as decrypted via the encryption status hypercall, which in turn caused consistent corruption of pages during live migration. Live migration requires accurate encryption status information to avoid migrating pages from the wrong perspective.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A Linux kernel bug in SEV's enc_dec_hypercall() allowed non-page-aligned vaddrs to corrupt live migration due to spurious decryption marking.

Root

Cause

The vulnerability resides in the Linux kernel's SEV (Secure Encrypted Virtualization) code. The function enc_dec_hypercall() accepted a page count (npages) instead of a byte size, forcing callers to round up their requests. When a virtual address (vaddr) was not page-aligned, the rounding caused pages that should remain encrypted to be marked as decrypted via the encryption status hypercall. [1]

Exploitation

An attacker with access to the hypervisor or migration infrastructure could trigger this bug during live migration. No special privileges on the guest are required; the flaw is in the kernel's handling of memory encryption status updates. As the official description states, 'non-page aligned vaddrs caused pages to be spuriously marked as decrypted via the encryption status hypercall.' [1]

Impact

The spurious decryption marking leads to 'consistent corruption of pages during live migration.' Live migration relies on accurate encryption status to transfer pages from the correct perspective (encrypted vs. decrypted). Any mismatch results in data corruption, potentially causing guest crashes or data leaks. [1]

Mitigation

The fix changes enc_dec_hypercall() to accept a size instead of a page count, ensuring correct handling for non-page-aligned addresses. The patch was committed to the stable kernel tree. Users should apply the update to prevent migration-induced corruption. [1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.