CVE-2023-53273

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53273
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53273.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53273
Downstream
Published
2025-09-16T08:15:36Z
Modified
2025-09-16T15:00:26Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

Drivers: vmbus: Check for channel allocation before looking up relids

relid2channel() assumes vmbus channel array to be allocated when called. However, in cases such as kdump/kexec, not all relids will be reset by the host. When the second kernel boots and if the guest receives a vmbus interrupt during vmbus driver initialization before vmbus_connect() is called, before it finishes, or if it fails, the vmbus interrupt service routine is called which in turn calls relid2channel() and can cause a null pointer dereference.

Print a warning and error out in relid2channel() for a channel id that's invalid in the second kernel.

References

Affected packages