CVE-2023-54092 — Improper Validation of Specified Index, Position, or Offset in Input in Linux
Severity
5.3MEDIUM
No vectorEPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
KVM: s390: pv: fix index value of replaced ASCE
The index field of the struct page corresponding to a guest ASCE should
be 0. When replacing the ASCE in s390_replace_asce(), the index of the
new ASCE should also be set to 0.
Having the wrong index might lead to the wrong addresses being passed
around when notifying pte invalidations, and eventually to validity
intercepts (VM crash) if the prefix gets unmapped and the notifier…
Affected Packages4 packages
▶CVEListV5linux/linux9d216035d173214cd33712d67d89220ef2283ebf — 8e635da0e0d3cb45e32fa79b36218fb98281bc10+7
🔴Vulnerability Details
3OSV▶
CVE-2023-54092: In the Linux kernel, the following vulnerability has been resolved: KVM: s390: pv: fix index value of replaced ASCE The index field of the struct page↗2025-12-24
GHSA▶
GHSA-g59x-v7cp-wpr9: In the Linux kernel, the following vulnerability has been resolved:
KVM: s390: pv: fix index value of replaced ASCE
The index field of the struct pa↗2025-12-24