THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2023-52639

KVM: s390: vsie: fix race during shadow creation

AssignerLinux
Reserved2024-03-06
Published2024-04-03
Updated2024-05-29

Description

In the Linux kernel, the following vulnerability has been resolved: KVM: s390: vsie: fix race during shadow creation Right now it is possible to see gmap->private being zero in kvm_s390_vsie_gmap_notifier resulting in a crash. This is due to the fact that we add gmap->private == kvm after creation: static int acquire_gmap_shadow(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page) { [...] gmap = gmap_shadow(vcpu->arch.gmap, asce, edat); if (IS_ERR(gmap)) return PTR_ERR(gmap); gmap->private = vcpu->kvm; Let children inherit the private field of the parent.

Product status

Default status
unaffected

a3508fbe9dc6 before 5df3b81a567e
affected

a3508fbe9dc6 before f5572c0323cf
affected

a3508fbe9dc6 before 28bb27824f25
affected

a3508fbe9dc6 before fe752331d4b3
affected

Default status
affected

4.8
affected

Any version before 4.8
unaffected

6.1.82
unaffected

6.6.22
unaffected

6.7.6
unaffected

6.8
unaffected

References

https://git.kernel.org/stable/c/5df3b81a567eb565029563f26f374ae3803a1dfc

https://git.kernel.org/stable/c/f5572c0323cf8b4f1f0618178648a25b8fb8a380

https://git.kernel.org/stable/c/28bb27824f25f36e5f80229a358d66ee09244082

https://git.kernel.org/stable/c/fe752331d4b361d43cfd0b89534b4b2176057c32

cve.org CVE-2023-52639

nvd.nist.gov CVE-2023-52639

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-52639
© Copyright 2024 THREATINT. Made in Cyprus with +