-

CVE-2023-53205

In the Linux kernel, the following vulnerability has been resolved:

KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler

We do check for target CPU == -1, but this might change at the time we
are going to use it. Hold the physical target CPU in a local variable to
avoid out-of-bound accesses to the cpu arrays.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5
Version 87e28a15c42cc592009c32a8c20e5789059027c2
Status affected
Version < 86bfb18bad60fc468e5f112cbbd918462a8dd435
Version 87e28a15c42cc592009c32a8c20e5789059027c2
Status affected
Version < dc7e0192c470a53d847c79a2796f9ac429477a26
Version 87e28a15c42cc592009c32a8c20e5789059027c2
Status affected
Version < 0bc380beb78aa352eadbc21d934dd9606fcee808
Version 87e28a15c42cc592009c32a8c20e5789059027c2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.13
Status affected
Version < 5.13
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.39
Status unaffected
Version <= 6.4.*
Version 6.4.4
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.047
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String