CVE-2023-53273NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: Drivers: vmbus: Check for channel allocation before looking up relids relid2channel() assumes vmbus channel array to be allocated when called. However, in cases such as kdump/kexec, not all relids will be reset by the host. When the second kernel boots and if the guest receives a vmbus interrupt during vmbus driver initialization before vmbus_connect() is called, before it finishes, or if it fails, the vmbus interrupt service

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.85.10.178+4
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux8b6a877c060ed6b86878fe66c7c6493a6054cf23176c6b4889195fbe7016d9401175b48c5c9edf68+5
debiandebian/linux< linux 6.1.25-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53273: In the Linux kernel, the following vulnerability has been resolved: Drivers: vmbus: Check for channel allocation before looking up relids relid2channe2025-09-16
GHSA
GHSA-h7h5-4hm9-wwx3: In the Linux kernel, the following vulnerability has been resolved: Drivers: vmbus: Check for channel allocation before looking up relids relid2chan2025-09-16

📋Vendor Advisories

2
Red Hat
kernel: Drivers: vmbus: Check for channel allocation before looking up relids2025-09-16
Debian
CVE-2023-53273: linux - In the Linux kernel, the following vulnerability has been resolved: Drivers: vm...2023
CVE-2023-53273 — NULL Pointer Dereference in Linux | cvebase