CVE-2023-53530
BaseFortify
Publication date: 2025-10-01
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's qla2xxx SCSI driver involves the incorrect use of the function smp_processor_id() in preemptible code, which can cause kernel bugs. The fix replaces smp_processor_id() with raw_smp_processor_id() and changes queue_work_on() to queue_work() to avoid using smp_processor_id() when CONFIG_DEBUG_PREEMPT is enabled, preventing potential kernel crashes or instability.
How can this vulnerability impact me? :
This vulnerability can lead to kernel bugs or crashes in systems using the affected qla2xxx driver, potentially causing system instability or downtime.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the kernel logs for the specific call trace indicating improper use of smp_processor_id() in preemptible code. You can use commands like 'dmesg | grep smp_processor_id' or 'journalctl -k | grep smp_processor_id' to find related kernel messages that show the BUG and call trace involving qla_nvme_post_cmd and smp_processor_id().
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the qla2xxx driver uses raw_smp_processor_id() instead of smp_processor_id(), and replaces queue_work_on() with queue_work() to avoid the problematic usage when CONFIG_DEBUG_PREEMPT is enabled. Until an update is applied, monitoring kernel logs for the BUG messages and avoiding workloads that trigger this code path may reduce impact.