CVE-2023-53530

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53530
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53530.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53530
Downstream
Related
Published
2025-10-01T11:46:15.075Z
Modified
2026-01-05T21:10:13.790995Z
Summary
scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Use rawsmpprocessorid() instead of smpprocessor_id()

The following call trace was observed:

localhost kernel: nvme nvme0: NVME-FC{0}: controller connect complete localhost kernel: BUG: using smpprocessorid() in preemptible [00000000] code: kworker/u129:4/75092 localhost kernel: nvme nvme0: NVME-FC{0}: new ctrl: NQN "nqn.1992-08.com.netapp:sn.b42d198afb4d11ecad6d00a098d6abfa:subsystem.PRChannel2022RH84subsystem291" localhost kernel: caller is qlanvmepostcmd+0x216/0x1380 [qla2xxx] localhost kernel: CPU: 6 PID: 75092 Comm: kworker/u129:4 Kdump: loaded Tainted: G B W OE --------- --- 5.14.0-70.22.1.el90.x8664+debug #1 localhost kernel: Hardware name: HPE ProLiant XL420 Gen10/ProLiant XL420 Gen10, BIOS U39 01/13/2022 localhost kernel: Workqueue: nvme-wq nvmeasynceventwork [nvmecore] localhost kernel: Call Trace: localhost kernel: dumpstacklvl+0x57/0x7d localhost kernel: checkpreemptiondisabled+0xc8/0xd0 localhost kernel: qlanvmepostcmd+0x216/0x1380 [qla2xxx]

Use rawsmpprocessorid() instead of smpprocessor_id().

Also use queuework() across the driver instead of queueworkon() thus avoiding usage of smpprocessorid() when CONFIGDEBUG_PREEMPT is enabled.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53530.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
532a239605667320f4fd7473e416b718d0a2fbbb
Fixed
1a541999f31fcb10ea50eba2a563e6c451fd5c7d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
35c02a333d523d9da0b482b0d751cdeb95c068ae
Fixed
52c7b41ad6ee53222f4ee2f0c099a6ed8291a168
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1d201c81d4cc6840735bbcc99e6031503e5cf3b8
Fixed
25bd0c7def04a272f8e89b36971712fe29c6e438
Fixed
59f10a05b5c7b675256a66e3161741239889ff80

Affected versions

v6.*

v6.2
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.5.1
v6.5.2
v6.5.3
v6.5.4

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53530.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.5.5

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53530.json"