CVE-2023-53245
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.13 (inc) to 4.14.323 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 4.19.292 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.254 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.191 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.127 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.46 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.4.11 (exc) |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's storvsc driver, which handles virtual Fibre Channel (vFC) devices presented by Hyper-V to guest VMs as SCSI devices. The issue arises because the storvsc driver partially integrates with the Fibre Channel transport in the Linux SCSI subsystem, but this integration is incomplete due to Hyper-V limitations. Specifically, when a Fibre Channel transport timeout occurs, the function fc_eh_timed_out() is called and causes a kernel panic by dereferencing a NULL pointer because it cannot find the remote port (rport). The original patch that linked storvsc's timeout handler to fc_eh_timed_out() was faulty. The fix removes this call, allowing storvsc to continue waiting for a response instead of panicking, which prevents the kernel panic and improves stability during transient timeouts.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic in systems using Hyper-V virtual Fibre Channel devices with the storvsc driver in the Linux kernel. A kernel panic leads to a system crash, causing downtime and potential data loss or service interruption. By triggering a panic during Fibre Channel timeouts, the system becomes unstable under certain I/O conditions, especially transient timeouts. The fix prevents the panic by allowing the system to wait longer instead of crashing, improving system reliability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the storvsc driver has been fixed to remove the call to fc_eh_timed_out(), preventing kernel panic on virtual Fibre Channel timeouts. This fix allows the system to continue waiting for a response instead of panicking. If updating is not immediately possible, consider avoiding use of the vFC functionality in storvsc as it may cause instability.