In the Linux kernel, the following vulnerability has been resolved:
KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler
We do check for target CPU == -1, but this might change at the time we are going to use it. Hold the physical target CPU in a local variable to avoid out-of-bound accesses to the cpu arrays.
[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86bfb18bad60fc468e5f112cbbd918462a8dd435",
        "target": {
            "file": "arch/s390/kvm/diag.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53205-0f10f999",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "40895643546851796321472317572819607626",
                "90221185251825903586892848896837342979",
                "81881294508838859390094945366779147902",
                "290849575073180236548685940903994425101",
                "45962620953650691265038045170978612955",
                "290773450668200456354818213749000238168",
                "262411194209895761941814907146349520668",
                "47020779011116696552376392262396906729",
                "327898761146386071306689610469758429256",
                "130114887335844684209461690534472901720",
                "325339090689244864969342250365459757529",
                "169565841580193679966040976942368339692",
                "120705064696155170603930190338195075404"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bc380beb78aa352eadbc21d934dd9606fcee808",
        "target": {
            "function": "__diag_time_slice_end_directed",
            "file": "arch/s390/kvm/diag.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53205-21579e69",
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "length": 905.0,
            "function_hash": "150019057763516446064507019226876062570"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc7e0192c470a53d847c79a2796f9ac429477a26",
        "target": {
            "file": "arch/s390/kvm/diag.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53205-59f1b615",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "40895643546851796321472317572819607626",
                "90221185251825903586892848896837342979",
                "81881294508838859390094945366779147902",
                "290849575073180236548685940903994425101",
                "45962620953650691265038045170978612955",
                "290773450668200456354818213749000238168",
                "262411194209895761941814907146349520668",
                "47020779011116696552376392262396906729",
                "327898761146386071306689610469758429256",
                "130114887335844684209461690534472901720",
                "325339090689244864969342250365459757529",
                "169565841580193679966040976942368339692",
                "120705064696155170603930190338195075404"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc7e0192c470a53d847c79a2796f9ac429477a26",
        "target": {
            "function": "__diag_time_slice_end_directed",
            "file": "arch/s390/kvm/diag.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53205-73779f7b",
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "length": 905.0,
            "function_hash": "150019057763516446064507019226876062570"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5",
        "target": {
            "function": "__diag_time_slice_end_directed",
            "file": "arch/s390/kvm/diag.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53205-77c833a2",
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "length": 905.0,
            "function_hash": "150019057763516446064507019226876062570"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a9ccf140a2a03a0ae82be4bdfbdd17bdaea72ff5",
        "target": {
            "file": "arch/s390/kvm/diag.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53205-81128a11",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "40895643546851796321472317572819607626",
                "90221185251825903586892848896837342979",
                "81881294508838859390094945366779147902",
                "290849575073180236548685940903994425101",
                "45962620953650691265038045170978612955",
                "290773450668200456354818213749000238168",
                "262411194209895761941814907146349520668",
                "47020779011116696552376392262396906729",
                "327898761146386071306689610469758429256",
                "130114887335844684209461690534472901720",
                "325339090689244864969342250365459757529",
                "169565841580193679966040976942368339692",
                "120705064696155170603930190338195075404"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86bfb18bad60fc468e5f112cbbd918462a8dd435",
        "target": {
            "function": "__diag_time_slice_end_directed",
            "file": "arch/s390/kvm/diag.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53205-e985fd08",
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "length": 905.0,
            "function_hash": "150019057763516446064507019226876062570"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bc380beb78aa352eadbc21d934dd9606fcee808",
        "target": {
            "file": "arch/s390/kvm/diag.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53205-f80a1da3",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "40895643546851796321472317572819607626",
                "90221185251825903586892848896837342979",
                "81881294508838859390094945366779147902",
                "290849575073180236548685940903994425101",
                "45962620953650691265038045170978612955",
                "290773450668200456354818213749000238168",
                "262411194209895761941814907146349520668",
                "47020779011116696552376392262396906729",
                "327898761146386071306689610469758429256",
                "130114887335844684209461690534472901720",
                "325339090689244864969342250365459757529",
                "169565841580193679966040976942368339692",
                "120705064696155170603930190338195075404"
            ]
        }
    }
]