Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-53811

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/12/2025
Última modificación:
09/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/irdma: Cap MSIX used to online CPUs + 1<br /> <br /> The irdma driver can use a maximum number of msix vectors equal<br /> to num_online_cpus() + 1 and the kernel warning stack below is shown<br /> if that number is exceeded.<br /> <br /> The kernel throws a warning as the driver tries to update the affinity<br /> hint with a CPU mask greater than the max CPU IDs. Fix this by capping<br /> the MSIX vectors to num_online_cpus() + 1.<br /> <br /> WARNING: CPU: 7 PID: 23655 at include/linux/cpumask.h:106 irdma_cfg_ceq_vector+0x34c/0x3f0 [irdma]<br /> RIP: 0010:irdma_cfg_ceq_vector+0x34c/0x3f0 [irdma]<br /> Call Trace:<br /> irdma_rt_init_hw+0xa62/0x1290 [irdma]<br /> ? irdma_alloc_local_mac_entry+0x1a0/0x1a0 [irdma]<br /> ? __is_kernel_percpu_address+0x63/0x310<br /> ? rcu_read_lock_held_common+0xe/0xb0<br /> ? irdma_lan_unregister_qset+0x280/0x280 [irdma]<br /> ? irdma_request_reset+0x80/0x80 [irdma]<br /> ? ice_get_qos_params+0x84/0x390 [ice]<br /> irdma_probe+0xa40/0xfc0 [irdma]<br /> ? rcu_read_lock_bh_held+0xd0/0xd0<br /> ? irdma_remove+0x140/0x140 [irdma]<br /> ? rcu_read_lock_sched_held+0x62/0xe0<br /> ? down_write+0x187/0x3d0<br /> ? auxiliary_match_id+0xf0/0x1a0<br /> ? irdma_remove+0x140/0x140 [irdma]<br /> auxiliary_bus_probe+0xa6/0x100<br /> __driver_probe_device+0x4a4/0xd50<br /> ? __device_attach_driver+0x2c0/0x2c0<br /> driver_probe_device+0x4a/0x110<br /> __driver_attach+0x1aa/0x350<br /> bus_for_each_dev+0x11d/0x1b0<br /> ? subsys_dev_iter_init+0xe0/0xe0<br /> bus_add_driver+0x3b1/0x610<br /> driver_register+0x18e/0x410<br /> ? 0xffffffffc0b88000<br /> irdma_init_module+0x50/0xaa [irdma]<br /> do_one_initcall+0x103/0x5f0<br /> ? perf_trace_initcall_level+0x420/0x420<br /> ? do_init_module+0x4e/0x700<br /> ? __kasan_kmalloc+0x7d/0xa0<br /> ? kmem_cache_alloc_trace+0x188/0x2b0<br /> ? kasan_unpoison+0x21/0x50<br /> do_init_module+0x1d1/0x700<br /> load_module+0x3867/0x5260<br /> ? layout_and_allocate+0x3990/0x3990<br /> ? rcu_read_lock_held_common+0xe/0xb0<br /> ? rcu_read_lock_sched_held+0x62/0xe0<br /> ? rcu_read_lock_bh_held+0xd0/0xd0<br /> ? __vmalloc_node_range+0x46b/0x890<br /> ? lock_release+0x5c8/0xba0<br /> ? alloc_vm_area+0x120/0x120<br /> ? selinux_kernel_module_from_file+0x2a5/0x300<br /> ? __inode_security_revalidate+0xf0/0xf0<br /> ? __do_sys_init_module+0x1db/0x260<br /> __do_sys_init_module+0x1db/0x260<br /> ? load_module+0x5260/0x5260<br /> ? do_syscall_64+0x22/0x450<br /> do_syscall_64+0xa5/0x450<br /> entry_SYSCALL_64_after_hwframe+0x66/0xdb

Impacto