KVM Vulnerability in Linux Kernel Exposes Users to TSC Scaling Threats
CVE-2023-53663
What is CVE-2023-53663?
A vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) allows users to bypass checks on nested TSC (Timestamp Counter) scaling support. Instead of verifying TSC scaling, the implementation mistakenly asserts that the feature is exposed to Level 1 (L1) when there's a mismatch with KVM's default MSR_AMD64_TSC_RATIO. This flaw can be exploited by manipulating the MSR and modifying the guest CPUID, potentially leading to a denial of service through continuous warnings and CPU errors. The vulnerability arises particularly within the nested virtualization context, where improper assumptions about feature exposure could compromise the system.
Affected Version(s)
Linux 5228eb96a4875f8cf5d61d486e3795ac14df8904 < 6c1ecfea1daf6e75c46e295aad99dfbafd878897
Linux 5228eb96a4875f8cf5d61d486e3795ac14df8904 < 02b24270568f65dd607c4a848512dc8055b4491b
Linux 5228eb96a4875f8cf5d61d486e3795ac14df8904 < 7cafe9b8e22bb3d77f130c461aedf6868c4aaf58