KVM: s390: vsie: fix race during shadow creation
Right now it is possible to see gmap->private being zero in
kvm_s390_vsie_gmap_notifier resulting in a crash. This is due to the
fact that we add gmap->private == kvm after creation:
static int acquire_gmap_shadow(struct kvm_vcpu *vcpu,
struct vsie_page *vsie_page)
{
[...]
gmap = gmap_shadow(vcpu->arch.gmap, asce, edat);
if (IS_ERR(gmap))
return PTR_ERR(gmap);
gmap->private = vcpu->kvm;
Let children inherit the private field of the parent.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5658-1 | linux security update |
Ubuntu USN |
USN-7121-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7121-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7121-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7159-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7159-2 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-7159-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7159-4 | Linux kernel (IoT) vulnerabilities |
Ubuntu USN |
USN-7166-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7166-2 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-7166-3 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-7159-5 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7166-4 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Ubuntu USN |
USN-7186-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-7186-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7194-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7195-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7195-2 | Linux kernel (Azure) vulnerabilities |
Mon, 17 Mar 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel |
|
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* |
|
| Vendors & Products |
Linux
Linux linux Kernel |
Mon, 04 Nov 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Aug 2024 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel E4s
|
|
| CPEs | cpe:/a:redhat:rhel_e4s:9.0 | |
| Vendors & Products |
Redhat rhel E4s
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2026-05-11T19:30:51.297Z
Reserved: 2024-03-06T09:52:12.093Z
Link: CVE-2023-52639
Updated: 2024-08-02T23:03:21.359Z
Status : Analyzed
Published: 2024-04-03T15:15:51.467
Modified: 2025-03-17T15:40:20.033
Link: CVE-2023-52639
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN