CVE-2023-53273

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53273
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53273.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53273
Downstream
Related
Published
2025-09-16T08:11:08.792Z
Modified
2025-11-28T02:35:26.423313Z
Summary
Drivers: vmbus: Check for channel allocation before looking up relids
Details

In the Linux kernel, the following vulnerability has been resolved:

Drivers: vmbus: Check for channel allocation before looking up relids

relid2channel() assumes vmbus channel array to be allocated when called. However, in cases such as kdump/kexec, not all relids will be reset by the host. When the second kernel boots and if the guest receives a vmbus interrupt during vmbus driver initialization before vmbus_connect() is called, before it finishes, or if it fails, the vmbus interrupt service routine is called which in turn calls relid2channel() and can cause a null pointer dereference.

Print a warning and error out in relid2channel() for a channel id that's invalid in the second kernel.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53273.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8b6a877c060ed6b86878fe66c7c6493a6054cf23
Fixed
176c6b4889195fbe7016d9401175b48c5c9edf68
Fixed
c373e49fbb87aa177819866ed9194ebc5414dfd6
Fixed
8c3f0ae5435fd20bb1e3a8308488aa6ac33151ee
Fixed
a5c44f3446a0565139b7d8abc78f58b86c398123
Fixed
1eb65c8687316c65140b48fad27133d583178e15

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.8.0
Fixed
5.10.178
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.107
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.24
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.11