-

CVE-2023-54108

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests

The following message and call trace was seen with debug kernels:

DMA-API: qla2xxx 0000:41:00.0: device driver failed to check map
error [device address=0x00000002a3ff38d8] [size=1024 bytes] [mapped as
single]
WARNING: CPU: 0 PID: 2930 at kernel/dma/debug.c:1017
	 check_unmap+0xf42/0x1990

Call Trace:
	debug_dma_unmap_page+0xc9/0x100
	qla_nvme_ls_unmap+0x141/0x210 [qla2xxx]

Remove DMA mapping from the driver altogether, as it is already done by FC
layer. This prevents the warning.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 3a564de3a299856f2cbd289649cea2e20d671a43
Version 2d087c7e55db420107c3ea97b228e067a7b488a1
Status affected
Version < e596253113b69b4018818260bd5da40c201bee73
Version 0910a791a6d7fd331f231f48200e18babb519769
Status affected
Version < 77302fb0e357da666d5249a6e91078feeef3dade
Version c9d6081a5f18286ad62afc1e9e06a90cfd626902
Status affected
Version < 3ee4f1991c54c6707aa9df47e51c02ea25bb63e3
Version c85ab7d9e27a80e48d5b7d7fb2fe2b0fdb2de523
Status affected
Version < ad6af23593594402c826eefdf43ae174e5f0f202
Version c85ab7d9e27a80e48d5b7d7fb2fe2b0fdb2de523
Status affected
Version < c75e6aef5039830cce5d4cf764dd204522f89e6b
Version c85ab7d9e27a80e48d5b7d7fb2fe2b0fdb2de523
Status affected
Version 9765319079131d6a6019caec661825808c6405f1
Status affected
Version c05f4f6485726faae08073f947368ee10439d3f0
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.18
Status affected
Version < 5.18
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.235
Status unaffected
Version <= 5.10.*
Version 5.10.173
Status unaffected
Version <= 5.15.*
Version 5.15.99
Status unaffected
Version <= 6.1.*
Version 6.1.16
Status unaffected
Version <= 6.2.*
Version 6.2.3
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.