CVE-2023-53756

Source
https://cve.org/CVERecord?id=CVE-2023-53756
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53756.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53756
Downstream
Published
2025-12-08T01:19:17.081Z
Modified
2026-03-09T23:52:28.213755Z
Summary
KVM: VMX: Fix crash due to uninitialized current_vmcs
Details

In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Fix crash due to uninitialized current_vmcs

KVM enables 'Enlightened VMCS' and 'Enlightened MSR Bitmap' when running as a nested hypervisor on top of Hyper-V. When MSR bitmap is updated, evmcstouchmsrbitmap function uses currentvmcs per-cpu variable to mark that the msr bitmap was changed.

vmxvcpucreate() modifies the msr bitmap via vmxdisableinterceptformsr -> vmxmsrbitmapl01changed which in the end calls this function. The function checks for currentvmcs if it is null but the check is insufficient because currentvmcs is not initialized. Because of this, the code might incorrectly write to the structure pointed by currentvmcs value left by another task. Preemption is not disabled, the current task can be preempted and moved to another CPU while currentvmcs is accessed multiple times from evmcstouchmsr_bitmap() which leads to crash.

The manipulation of MSR bitmaps by callers happens only for vmcs01 so the solution is to use vmx->vmcs01.vmcs instead of current_vmcs.

BUG: kernel NULL pointer dereference, address: 0000000000000338 PGD 4e1775067 P4D 0 Oops: 0002 [#1] PREEMPT SMP NOPTI ... RIP: 0010:vmxmsrbitmapl01changed+0x39/0x50 [kvmintel] ... Call Trace: vmxdisableinterceptformsr+0x36/0x260 [kvmintel] vmxvcpucreate+0xe6/0x540 [kvmintel] kvmarchvcpucreate+0x1d1/0x2e0 [kvm] kvmvmioctlcreatevcpu+0x178/0x430 [kvm] kvmvmioctl+0x53f/0x790 [kvm] __x64sysioctl+0x8a/0xc0 dosyscall64+0x5c/0x90 entrySYSCALL64afterhwframe+0x63/0xcd

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53756.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ceef7d10dfb6284d512c499292e6daa35ea83f90
Fixed
6baebcecf09acd19e2bab1c2911dcdba5d48a1dc
Fixed
6e7bc50f97c9855da83f1478f722590defd45ff2
Fixed
b2de2b4d4e007f9add46ea8dc06f781835e3ea9f
Fixed
3ba95cc671c025d0d2a1c7d5e2930f0ff0980cf4
Fixed
93827a0a36396f2fd6368a54a020f420c8916e9b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53756.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.18.0
Fixed
5.10.175
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.103
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53756.json"