๐Ÿ” CVE Alert

CVE-2023-53259

UNKNOWN 0.0

VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF The call to get_user_pages_fast() in vmci_host_setup_notify() can return NULL context->notify_page causing a GPF. To avoid GPF check if context->notify_page == NULL and return error if so. general protection fault, probably for non-canonical address 0xe0009d1000000060: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x0005088000000300- 0x0005088000000307] CPU: 2 PID: 26180 Comm: repro_34802241 Not tainted 6.1.0-rc4 #1 Hardware name: Red Hat KVM, BIOS 1.15.0-2.module+el8.6.0 04/01/2014 RIP: 0010:vmci_ctx_check_signal_notify+0x91/0xe0 Call Trace: <TASK> vmci_host_unlocked_ioctl+0x362/0x1f40 __x64_sys_ioctl+0x1a1/0x230 do_syscall_64+0x3a/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 15, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a1d88436d53a75e950db15834b3d2f8c0c358fdc < b4239bfb260d1e6837766c41a0b241d7670f1402 a1d88436d53a75e950db15834b3d2f8c0c358fdc < d4198f67e7556b1507f14f60d81a72660e5560e4 a1d88436d53a75e950db15834b3d2f8c0c358fdc < a3c89e8c69a58f62451c0a75b77fcab25979b897 a1d88436d53a75e950db15834b3d2f8c0c358fdc < 055891397f530f9b1b22be38d7eca8b08382941f a1d88436d53a75e950db15834b3d2f8c0c358fdc < 91b8e4f61f8f4594ee65368c8d89e6fdc29d3fb1 a1d88436d53a75e950db15834b3d2f8c0c358fdc < 1a726cb47fd204109c767409fa9ca15a96328f14
Linux / Linux
4.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b4239bfb260d1e6837766c41a0b241d7670f1402 git.kernel.org: https://git.kernel.org/stable/c/d4198f67e7556b1507f14f60d81a72660e5560e4 git.kernel.org: https://git.kernel.org/stable/c/a3c89e8c69a58f62451c0a75b77fcab25979b897 git.kernel.org: https://git.kernel.org/stable/c/055891397f530f9b1b22be38d7eca8b08382941f git.kernel.org: https://git.kernel.org/stable/c/91b8e4f61f8f4594ee65368c8d89e6fdc29d3fb1 git.kernel.org: https://git.kernel.org/stable/c/1a726cb47fd204109c767409fa9ca15a96328f14 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html