CVE-2023-53647
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's hv_vmbus driver when it tries to walk the ACPI namespace from the VMBus ACPI device up to the ACPI namespace root object to find Hyper-V MMIO ranges. If these ranges are not found, the driver ends up walking the resources of the ACPI namespace root object itself, which has an all-ones handle. Dereferencing this handle causes a NULL pointer dereference in the ACPI code, leading to a kernel oops (crash) during boot on certain VMBus host implementations that do not provide Hyper-V MMIO ranges, such as QEMU's VMBus implementation. The fix involves stopping the lookup explicitly at the ACPI namespace root object to prevent this dereference.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel oops) during system boot when running on virtualized environments using VMBus host implementations that do not provide Hyper-V MMIO ranges, such as QEMU. This can lead to system instability or failure to boot properly in affected configurations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a NULL pointer dereference in the ACPI code causing a kernel oops during boot on systems using the VMBus client driver without Hyper-V MMIO ranges. Detection involves checking system boot logs for oops messages related to hv_vmbus or ACPI namespace errors. You can use commands like 'dmesg | grep -i vmbus' or 'journalctl -k | grep -i acpi' to look for relevant error messages indicating the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the Linux kernel update that includes the fix which prevents dereferencing the ACPI root object handle by terminating the lookup explicitly at the ACPI namespace root object. Until patched, avoid running Linux guests under KVM/QEMU with the VMBus client driver enabled if the host does not provide Hyper-V MMIO ranges, or disable the Hyper-V PV interface if possible.