KVM Vulnerability in Linux Kernel Exposes Users to TSC Scaling Threats
CVE-2023-53663

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
7 October 2025

What is CVE-2023-53663?

A vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) allows users to bypass checks on nested TSC (Timestamp Counter) scaling support. Instead of verifying TSC scaling, the implementation mistakenly asserts that the feature is exposed to Level 1 (L1) when there's a mismatch with KVM's default MSR_AMD64_TSC_RATIO. This flaw can be exploited by manipulating the MSR and modifying the guest CPUID, potentially leading to a denial of service through continuous warnings and CPU errors. The vulnerability arises particularly within the nested virtualization context, where improper assumptions about feature exposure could compromise the system.

Affected Version(s)

Linux 5228eb96a4875f8cf5d61d486e3795ac14df8904 < 6c1ecfea1daf6e75c46e295aad99dfbafd878897

Linux 5228eb96a4875f8cf5d61d486e3795ac14df8904 < 02b24270568f65dd607c4a848512dc8055b4491b

Linux 5228eb96a4875f8cf5d61d486e3795ac14df8904 < 7cafe9b8e22bb3d77f130c461aedf6868c4aaf58

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-53663 : KVM Vulnerability in Linux Kernel Exposes Users to TSC Scaling Threats