CVE-2023-53205
KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler We do check for target CPU == -1, but this might change at the time we are going to use it. Hold the physical target CPU in a local variable to avoid out-of-bound accesses to the cpu arrays.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 15, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
87e28a15c42cc592009c32a8c20e5789059027c2 < a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5 87e28a15c42cc592009c32a8c20e5789059027c2 < 86bfb18bad60fc468e5f112cbbd918462a8dd435 87e28a15c42cc592009c32a8c20e5789059027c2 < dc7e0192c470a53d847c79a2796f9ac429477a26 87e28a15c42cc592009c32a8c20e5789059027c2 < 0bc380beb78aa352eadbc21d934dd9606fcee808
Linux / Linux
5.13
References
git.kernel.org: https://git.kernel.org/stable/c/a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5 git.kernel.org: https://git.kernel.org/stable/c/86bfb18bad60fc468e5f112cbbd918462a8dd435 git.kernel.org: https://git.kernel.org/stable/c/dc7e0192c470a53d847c79a2796f9ac429477a26 git.kernel.org: https://git.kernel.org/stable/c/0bc380beb78aa352eadbc21d934dd9606fcee808