CVE-2025-38508
Linux Ubuntu vulnerability analysis and mitigation

Overview

A vulnerability in the Linux kernel (CVE-2025-38508) was identified related to the Secure TSC frequency calculation in x86/sev systems. The issue was discovered and published to the CVE List on August 16, 2025, affecting Linux kernel systems using SEV-SNP VMs (NVD CVE).

Technical details

The vulnerability stems from a discrepancy in the GUESTTSCFREQ MSR reporting, which bases frequency calculations on the nominal P0 frequency. This creates a deviation of approximately 0.2% from the actual mean TSC frequency due to clocking parameters. The issue manifests in the guest kernel's reliance on the reported nominal frequency for TSC-based timekeeping, while the actual frequency set during SNPLAUNCHSTART differs (Debian Tracker).

Impact

Over extended VM uptime, the frequency discrepancy accumulates, resulting in clock skew between the hypervisor and SEV-SNP VM. This leads to early timer interrupts as perceived by the guest and causes inaccurate time calculations, affecting the system's timekeeping reliability (NVD CVE).

Mitigation and workarounds

The vulnerability has been resolved by utilizing the TSCFACTOR from the SEV firmware's secrets page to calculate the mean TSC frequency. The fix implements earlyioremapencrypted() to map the secrets page, as ioremapencrypted() uses kmalloc() which is not available during early TSC initialization. Fixed versions are available in various Linux distributions, including Debian bullseye (5.10.237-1), bookworm (6.1.147-1), and trixie (6.12.41-1) (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management