CVE-2023-53273

Source
https://cve.org/CVERecord?id=CVE-2023-53273
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53273.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53273
Downstream
Related
Published
2025-09-16T08:11:08.792Z
Modified
2026-03-20T12:33:04.678284Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Drivers: vmbus: Check for channel allocation before looking up relids
Details

In the Linux kernel, the following vulnerability has been resolved:

Drivers: vmbus: Check for channel allocation before looking up relids

relid2channel() assumes vmbus channel array to be allocated when called. However, in cases such as kdump/kexec, not all relids will be reset by the host. When the second kernel boots and if the guest receives a vmbus interrupt during vmbus driver initialization before vmbus_connect() is called, before it finishes, or if it fails, the vmbus interrupt service routine is called which in turn calls relid2channel() and can cause a null pointer dereference.

Print a warning and error out in relid2channel() for a channel id that's invalid in the second kernel.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53273.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8b6a877c060ed6b86878fe66c7c6493a6054cf23
Fixed
176c6b4889195fbe7016d9401175b48c5c9edf68
Fixed
c373e49fbb87aa177819866ed9194ebc5414dfd6
Fixed
8c3f0ae5435fd20bb1e3a8308488aa6ac33151ee
Fixed
a5c44f3446a0565139b7d8abc78f58b86c398123
Fixed
1eb65c8687316c65140b48fad27133d583178e15

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53273.json"