Improper Update of Reference Count Affecting kernel-debug-devel-matched package, versions <0:5.14.0-427.13.1.el9_4


Severity

Recommended
high

Based on CentOS security rating.

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS9-KERNELDEBUGDEVELMATCHED-14771514
  • published31 Dec 2025
  • disclosed30 Dec 2025

Introduced: 30 Dec 2025

CVE-2023-54201  (opens in a new tab)
CWE-911  (opens in a new tab)

How to fix?

Upgrade Centos:9 kernel-debug-devel-matched to version 0:5.14.0-427.13.1.el9_4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-debug-devel-matched package and not the kernel-debug-devel-matched package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

RDMA/efa: Fix wrong resources deallocation order

When trying to destroy QP or CQ, we first decrease the refcount and potentially free memory regions allocated for the object and then request the device to destroy the object. If the device fails, the object isn't fully destroyed so the user/IB core can try to destroy the object again which will lead to underflow when trying to decrease an already zeroed refcount.

Deallocate resources in reverse order of allocating them to safely free them.

CVSS Base Scores

version 3.1