-
CVE-2023-53205
- EPSS 0.02%
- Published 15.09.2025 14:21:33
- Last modified 15.09.2025 15:22:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler We do check for target CPU == -1, but this might change at the time we are going to use it. Hold the physical target CPU in a local variable to avoid out-of-bound accesses to the cpu arrays.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5
Version
87e28a15c42cc592009c32a8c20e5789059027c2
Status
affected
Version <
86bfb18bad60fc468e5f112cbbd918462a8dd435
Version
87e28a15c42cc592009c32a8c20e5789059027c2
Status
affected
Version <
dc7e0192c470a53d847c79a2796f9ac429477a26
Version
87e28a15c42cc592009c32a8c20e5789059027c2
Status
affected
Version <
0bc380beb78aa352eadbc21d934dd9606fcee808
Version
87e28a15c42cc592009c32a8c20e5789059027c2
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.13
Status
affected
Version <
5.13
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.121
Status
unaffected
Version <=
6.1.*
Version
6.1.39
Status
unaffected
Version <=
6.4.*
Version
6.4.4
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.047 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|