CVE-2023-53205

Source
https://cve.org/CVERecord?id=CVE-2023-53205
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53205.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53205
Downstream
Related
Published
2025-09-15T14:21:33.560Z
Modified
2026-03-12T03:28:05.741975Z
Summary
KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler
Details

In the Linux kernel, the following vulnerability has been resolved:

KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler

We do check for target CPU == -1, but this might change at the time we are going to use it. Hold the physical target CPU in a local variable to avoid out-of-bound accesses to the cpu arrays.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53205.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
87e28a15c42cc592009c32a8c20e5789059027c2
Fixed
a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5
Fixed
86bfb18bad60fc468e5f112cbbd918462a8dd435
Fixed
dc7e0192c470a53d847c79a2796f9ac429477a26
Fixed
0bc380beb78aa352eadbc21d934dd9606fcee808

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53205.json"