In the Linux kernel, the following vulnerability has been resolved:
KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler
We do check for target CPU == -1, but this might change at the time we
are going to use it. Hold the physical target CPU in a local variable to
avoid out-of-bound accesses to the cpu arrays.
References
Configurations
Configuration 1 (hide)
|
History
04 Dec 2025, 15:06
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/0bc380beb78aa352eadbc21d934dd9606fcee808 - Patch | |
| References | () https://git.kernel.org/stable/c/86bfb18bad60fc468e5f112cbbd918462a8dd435 - Patch | |
| References | () https://git.kernel.org/stable/c/a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5 - Patch | |
| References | () https://git.kernel.org/stable/c/dc7e0192c470a53d847c79a2796f9ac429477a26 - Patch | |
| CWE | CWE-787 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
15 Sep 2025, 15:22
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-15 15:15
Updated : 2025-12-04 15:06
NVD link : CVE-2023-53205
Mitre link : CVE-2023-53205
CVE.ORG link : CVE-2023-53205
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
