CVE-2023-54296

Source
https://cve.org/CVERecord?id=CVE-2023-54296
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54296.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54296
Downstream
Related
Published
2025-12-30T12:23:33.141Z
Modified
2026-03-31T17:29:54.219522010Z
Summary
KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration
Details

In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration

Fix a goof where KVM tries to grab source vCPUs from the destination VM when doing intrahost migration. Grabbing the wrong vCPU not only hoses the guest, it also crashes the host due to the VMSA pointer being left NULL.

BUG: unable to handle page fault for address: ffffe38687000000 #PF: supervisor read access in kernel mode #PF: errorcode(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] SMP NOPTI CPU: 39 PID: 17143 Comm: sevmigratetes Tainted: GO 6.5.0-smp--fff2e47e6c3b-next #151 Hardware name: Google, Inc. ArcadiaIT80/ArcadiaIT_80, BIOS 34.28.0 07/10/2023 RIP: 0010:__freepages+0x15/0xd0 RSP: 0018:ffff923fcf6e3c78 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffe38687000000 RCX: 0000000000000100 RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffe38687000000 RBP: ffff923fcf6e3c88 R08: ffff923fcafb0000 R09: 0000000000000000 R10: 0000000000000000 R11: ffffffff83619b90 R12: ffff923fa9540000 R13: 0000000000080007 R14: ffff923f6d35d000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff929d0d7c0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffe38687000000 CR3: 0000005224c34005 CR4: 0000000000770ee0 PKRU: 55555554 Call Trace: <TASK> sevfreevcpu+0xcb/0x110 [kvmamd] svmvcpufree+0x75/0xf0 [kvmamd] kvmarchvcpudestroy+0x36/0x140 [kvm] kvmdestroyvcpus+0x67/0x100 [kvm] kvmarchdestroyvm+0x161/0x1d0 [kvm] kvmputkvm+0x276/0x560 [kvm] kvmvm_release+0x25/0x30 [kvm] __fput+0x106/0x280 ____fput+0x12/0x20 taskworkrun+0x86/0xb0 doexit+0x2e3/0x9c0 dogroup_exit+0xb1/0xc0 _x64sysexitgroup+0x1b/0x20 dosyscall64+0x41/0x90 entrySYSCALL64afterhwframe+0x63/0xcd </TASK> CR2: ffffe38687000000

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54296.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6defa24d3b12bbd418bc8526dea1cbc605265c06
Fixed
5c18ace750e4d4d58d7da02d1c669bf21c824158
Fixed
2ee4b180d51b12a45bdd3264629719ef6a572a73
Fixed
f1187ef24eb8f36e8ad8106d22615ceddeea6097
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
229334a8b1d0d5e60d3bdd091bbc4552d5321c97

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54296.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
6.1.54
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54296.json"