In the Linux kernel, the following vulnerability has been resolved:
KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler
We do check for target CPU == -1, but this might change at the time we are going to use it. Hold the physical target CPU in a local variable to avoid out-of-bound accesses to the cpu arrays.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53205.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53205.json"
[
{
"target": {
"file": "arch/s390/kvm/diag.c"
},
"digest": {
"line_hashes": [
"40895643546851796321472317572819607626",
"90221185251825903586892848896837342979",
"81881294508838859390094945366779147902",
"290849575073180236548685940903994425101",
"45962620953650691265038045170978612955",
"290773450668200456354818213749000238168",
"262411194209895761941814907146349520668",
"47020779011116696552376392262396906729",
"327898761146386071306689610469758429256",
"130114887335844684209461690534472901720",
"325339090689244864969342250365459757529",
"169565841580193679966040976942368339692",
"120705064696155170603930190338195075404"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2023-53205-0f10f999",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86bfb18bad60fc468e5f112cbbd918462a8dd435",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "arch/s390/kvm/diag.c",
"function": "__diag_time_slice_end_directed"
},
"digest": {
"length": 905.0,
"function_hash": "150019057763516446064507019226876062570"
},
"signature_type": "Function",
"id": "CVE-2023-53205-21579e69",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bc380beb78aa352eadbc21d934dd9606fcee808",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "arch/s390/kvm/diag.c"
},
"digest": {
"line_hashes": [
"40895643546851796321472317572819607626",
"90221185251825903586892848896837342979",
"81881294508838859390094945366779147902",
"290849575073180236548685940903994425101",
"45962620953650691265038045170978612955",
"290773450668200456354818213749000238168",
"262411194209895761941814907146349520668",
"47020779011116696552376392262396906729",
"327898761146386071306689610469758429256",
"130114887335844684209461690534472901720",
"325339090689244864969342250365459757529",
"169565841580193679966040976942368339692",
"120705064696155170603930190338195075404"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2023-53205-59f1b615",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc7e0192c470a53d847c79a2796f9ac429477a26",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "arch/s390/kvm/diag.c",
"function": "__diag_time_slice_end_directed"
},
"digest": {
"length": 905.0,
"function_hash": "150019057763516446064507019226876062570"
},
"signature_type": "Function",
"id": "CVE-2023-53205-73779f7b",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc7e0192c470a53d847c79a2796f9ac429477a26",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "arch/s390/kvm/diag.c",
"function": "__diag_time_slice_end_directed"
},
"digest": {
"length": 905.0,
"function_hash": "150019057763516446064507019226876062570"
},
"signature_type": "Function",
"id": "CVE-2023-53205-77c833a2",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "arch/s390/kvm/diag.c"
},
"digest": {
"line_hashes": [
"40895643546851796321472317572819607626",
"90221185251825903586892848896837342979",
"81881294508838859390094945366779147902",
"290849575073180236548685940903994425101",
"45962620953650691265038045170978612955",
"290773450668200456354818213749000238168",
"262411194209895761941814907146349520668",
"47020779011116696552376392262396906729",
"327898761146386071306689610469758429256",
"130114887335844684209461690534472901720",
"325339090689244864969342250365459757529",
"169565841580193679966040976942368339692",
"120705064696155170603930190338195075404"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2023-53205-81128a11",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "arch/s390/kvm/diag.c",
"function": "__diag_time_slice_end_directed"
},
"digest": {
"length": 905.0,
"function_hash": "150019057763516446064507019226876062570"
},
"signature_type": "Function",
"id": "CVE-2023-53205-e985fd08",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86bfb18bad60fc468e5f112cbbd918462a8dd435",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "arch/s390/kvm/diag.c"
},
"digest": {
"line_hashes": [
"40895643546851796321472317572819607626",
"90221185251825903586892848896837342979",
"81881294508838859390094945366779147902",
"290849575073180236548685940903994425101",
"45962620953650691265038045170978612955",
"290773450668200456354818213749000238168",
"262411194209895761941814907146349520668",
"47020779011116696552376392262396906729",
"327898761146386071306689610469758429256",
"130114887335844684209461690534472901720",
"325339090689244864969342250365459757529",
"169565841580193679966040976942368339692",
"120705064696155170603930190338195075404"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2023-53205-f80a1da3",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bc380beb78aa352eadbc21d934dd9606fcee808",
"deprecated": false,
"signature_version": "v1"
}
]