CVE-2023-53754
Published: December 9, 2025Last modified: December 9, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() When if_type equals zero and pci_resource_start(pdev, PCI_64BIT_BAR4) returns false, drbl_regs_memmap_p is not remapped. This passes a NULL pointer to iounmap(), which can trigger a WARN() on certain arches. When if_type equals six and pci_resource_start(pdev, PCI_64BIT_BAR4) returns true, drbl_regs_memmap_p may has been remapped and ctrl_regs_memmap_p is not remapped. This is a resource leak and passes a NULL pointer to iounmap(). To fix these issues, we need to add null checks before iounmap(), and change some goto labels.
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Not affected (6.1.33-r0) |
| 25 LTS | linux-lts | Not affected (6.6.89-r0) | |
| Stream | linux-lts | Fixed (6.6.58-r0) |
References
- https://git.kernel.org/stable/c/631d0fab143bef85ea0813596f1dda36e2b9724c
- https://git.kernel.org/stable/c/74d90f92eafe8ccd12827228236a28a94eda6bcc
- https://git.kernel.org/stable/c/7e5a54d1f00725a739dcd20f616d82eff4f764bd
- https://git.kernel.org/stable/c/91a0c0c1413239d0548b5aac4c82f38f6d53a91e
- https://git.kernel.org/stable/c/bab8dc38b1a0a12bc064fc064269033bdcf5b88e
- https://git.kernel.org/stable/c/e6f1ef4a53856ed000b0f7265d7e16dcb00f4243
- https://git.kernel.org/stable/c/fd8c83d8375b9dac1949f2753485a5c055ebfad0