CVE-2023-53273
16.09.2025, 08:15
In the Linux kernel, the following vulnerability has been resolved: Drivers: vmbus: Check for channel allocation before looking up relids relid2channel() assumes vmbus channel array to be allocated when called. However, in cases such as kdump/kexec, not all relids will be reset by the host. When the second kernel boots and if the guest receives a vmbus interrupt during vmbus driver initialization before vmbus_connect() is called, before it finishes, or if it fails, the vmbus interrupt service routine is called which in turn calls relid2channel() and can cause a null pointer dereference. Print a warning and error out in relid2channel() for a channel id that's invalid in the second kernel.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 5.8 ≤ 𝑥 < 5.10.178 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.107 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.24 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.2.11 |
| linux | linux_kernel | 6.3:rc1 |
| linux | linux_kernel | 6.3:rc2 |
| linux | linux_kernel | 6.3:rc3 |
| linux | linux_kernel | 6.3:rc4 |
| linux | linux_kernel | 6.3:rc5 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References