CVE-2023-53273

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
16/09/2025
Last modified:
14/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Drivers: vmbus: Check for channel allocation before looking up relids<br /> <br /> relid2channel() assumes vmbus channel array to be allocated when called.<br /> However, in cases such as kdump/kexec, not all relids will be reset by the host.<br /> When the second kernel boots and if the guest receives a vmbus interrupt during<br /> vmbus driver initialization before vmbus_connect() is called, before it finishes,<br /> or if it fails, the vmbus interrupt service routine is called which in turn calls<br /> relid2channel() and can cause a null pointer dereference.<br /> <br /> Print a warning and error out in relid2channel() for a channel id that&amp;#39;s invalid<br /> in the second kernel.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.8 (including) 5.10.178 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.107 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.24 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.2.11 (excluding)
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*