CVE-2023-53754 Affecting kernel-debug-modules-extra package, versions *


Severity

Recommended
low

Based on CentOS security rating.

Threat Intelligence

EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS8-KERNELDEBUGMODULESEXTRA-14258716
  • published9 Dec 2025
  • disclosed8 Dec 2025

Introduced: 8 Dec 2025

NewCVE-2023-53754  (opens in a new tab)

How to fix?

There is no fixed version for Centos:8 kernel-debug-modules-extra.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-debug-modules-extra package and not the kernel-debug-modules-extra package as distributed by Centos. See How to fix? for Centos:8 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup()

When if_type equals zero and pci_resource_start(pdev, PCI_64BIT_BAR4) returns false, drbl_regs_memmap_p is not remapped. This passes a NULL pointer to iounmap(), which can trigger a WARN() on certain arches.

When if_type equals six and pci_resource_start(pdev, PCI_64BIT_BAR4) returns true, drbl_regs_memmap_p may has been remapped and ctrl_regs_memmap_p is not remapped. This is a resource leak and passes a NULL pointer to iounmap().

To fix these issues, we need to add null checks before iounmap(), and change some goto labels.

CVSS Base Scores

version 3.1