CVE-2023-53205

In the Linux kernel, the following vulnerability has been resolved: KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler We do check for target CPU == -1, but this might change at the time we are going to use it. Hold the physical target CPU in a local variable to avoid out-of-bound accesses to the cpu arrays.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

04 Dec 2025, 15:06

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0bc380beb78aa352eadbc21d934dd9606fcee808 - () https://git.kernel.org/stable/c/0bc380beb78aa352eadbc21d934dd9606fcee808 - Patch
References () https://git.kernel.org/stable/c/86bfb18bad60fc468e5f112cbbd918462a8dd435 - () https://git.kernel.org/stable/c/86bfb18bad60fc468e5f112cbbd918462a8dd435 - Patch
References () https://git.kernel.org/stable/c/a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5 - () https://git.kernel.org/stable/c/a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5 - Patch
References () https://git.kernel.org/stable/c/dc7e0192c470a53d847c79a2796f9ac429477a26 - () https://git.kernel.org/stable/c/dc7e0192c470a53d847c79a2796f9ac429477a26 - Patch
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

15 Sep 2025, 15:22

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-15 15:15

Updated : 2025-12-04 15:06


NVD link : CVE-2023-53205

Mitre link : CVE-2023-53205

CVE.ORG link : CVE-2023-53205


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write