CVE-2023-53811

Source
https://cve.org/CVERecord?id=CVE-2023-53811
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53811.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53811
Downstream
Related
Published
2025-12-09T00:01:09.005Z
Modified
2026-01-30T01:44:59.687216Z
Summary
RDMA/irdma: Cap MSIX used to online CPUs + 1
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Cap MSIX used to online CPUs + 1

The irdma driver can use a maximum number of msix vectors equal to numonlinecpus() + 1 and the kernel warning stack below is shown if that number is exceeded.

The kernel throws a warning as the driver tries to update the affinity hint with a CPU mask greater than the max CPU IDs. Fix this by capping the MSIX vectors to numonlinecpus() + 1.

WARNING: CPU: 7 PID: 23655 at include/linux/cpumask.h:106 irdmacfgceqvector+0x34c/0x3f0 [irdma] RIP: 0010:irdmacfgceqvector+0x34c/0x3f0 [irdma] Call Trace: irdmartinithw+0xa62/0x1290 [irdma] ? irdmaalloclocalmacentry+0x1a0/0x1a0 [irdma] ? _iskernelpercpuaddress+0x63/0x310 ? rcureadlockheldcommon+0xe/0xb0 ? irdmalanunregisterqset+0x280/0x280 [irdma] ? irdmarequestreset+0x80/0x80 [irdma] ? icegetqosparams+0x84/0x390 [ice] irdmaprobe+0xa40/0xfc0 [irdma] ? rcureadlockbhheld+0xd0/0xd0 ? irdmaremove+0x140/0x140 [irdma] ? rcureadlockschedheld+0x62/0xe0 ? downwrite+0x187/0x3d0 ? auxiliarymatchid+0xf0/0x1a0 ? irdmaremove+0x140/0x140 [irdma] auxiliarybusprobe+0xa6/0x100 _driverprobedevice+0x4a4/0xd50 ? _deviceattachdriver+0x2c0/0x2c0 driverprobedevice+0x4a/0x110 _driverattach+0x1aa/0x350 busforeachdev+0x11d/0x1b0 ? subsysdeviterinit+0xe0/0xe0 busadddriver+0x3b1/0x610 driverregister+0x18e/0x410 ? 0xffffffffc0b88000 irdmainitmodule+0x50/0xaa [irdma] dooneinitcall+0x103/0x5f0 ? perftraceinitcalllevel+0x420/0x420 ? doinitmodule+0x4e/0x700 ? _kasankmalloc+0x7d/0xa0 ? kmemcachealloctrace+0x188/0x2b0 ? kasanunpoison+0x21/0x50 doinitmodule+0x1d1/0x700 loadmodule+0x3867/0x5260 ? layoutandallocate+0x3990/0x3990 ? rcureadlockheldcommon+0xe/0xb0 ? rcureadlockschedheld+0x62/0xe0 ? rcureadlockbhheld+0xd0/0xd0 ? _vmallocnoderange+0x46b/0x890 ? lockrelease+0x5c8/0xba0 ? allocvmarea+0x120/0x120 ? selinuxkernelmodulefromfile+0x2a5/0x300 ? _inodesecurityrevalidate+0xf0/0xf0 ? _dosysinitmodule+0x1db/0x260 _dosysinitmodule+0x1db/0x260 ? loadmodule+0x5260/0x5260 ? dosyscall64+0x22/0x450 dosyscall64+0xa5/0x450 entrySYSCALL64afterhwframe+0x66/0xdb

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53811.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
44d9e52977a1b90b0db1c7f8b197c218e9226520
Fixed
87674a359ad173a3b8cd484e92e4f1901666da4c
Fixed
b3bd44bf20cb3a6a47aa4373e1817147efb4be04
Fixed
209e4aa9a7b636d8aaa1297e1d089ee2ed91d73f
Fixed
9cd9842c46996ef62173c36619c746f57416bcb0

Affected versions

v5.*
v5.13
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.63
v5.15.64
v5.15.65
v5.15.66
v5.15.67
v5.15.68
v5.15.69
v5.15.7
v5.15.70
v5.15.71
v5.15.72
v5.15.73
v5.15.74
v5.15.75
v5.15.76
v5.15.77
v5.15.78
v5.15.79
v5.15.8
v5.15.80
v5.15.81
v5.15.82
v5.15.83
v5.15.84
v5.15.85
v5.15.86
v5.15.87
v5.15.88
v5.15.89
v5.15.9
v5.15.90
v5.15.91
v5.15.92
v5.15.93
v5.15.94
v5.15.95
v5.15.96
v5.15.97
v5.15.98
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v6.*
v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.2.1
v6.2.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53811.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53811.json"