-
CVE-2023-54108
- EPSS 0.04%
- Veröffentlicht 24.12.2025 13:06:32
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests The following message and call trace was seen with debug kernels: DMA-API: qla2xxx 0000:41:00.0: device driver failed to check map error [device address=0x00000002a3ff38d8] [size=1024 bytes] [mapped as single] WARNING: CPU: 0 PID: 2930 at kernel/dma/debug.c:1017 check_unmap+0xf42/0x1990 Call Trace: debug_dma_unmap_page+0xc9/0x100 qla_nvme_ls_unmap+0x141/0x210 [qla2xxx] Remove DMA mapping from the driver altogether, as it is already done by FC layer. This prevents the warning.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
3a564de3a299856f2cbd289649cea2e20d671a43
Version
2d087c7e55db420107c3ea97b228e067a7b488a1
Status
affected
Version <
e596253113b69b4018818260bd5da40c201bee73
Version
0910a791a6d7fd331f231f48200e18babb519769
Status
affected
Version <
77302fb0e357da666d5249a6e91078feeef3dade
Version
c9d6081a5f18286ad62afc1e9e06a90cfd626902
Status
affected
Version <
3ee4f1991c54c6707aa9df47e51c02ea25bb63e3
Version
c85ab7d9e27a80e48d5b7d7fb2fe2b0fdb2de523
Status
affected
Version <
ad6af23593594402c826eefdf43ae174e5f0f202
Version
c85ab7d9e27a80e48d5b7d7fb2fe2b0fdb2de523
Status
affected
Version <
c75e6aef5039830cce5d4cf764dd204522f89e6b
Version
c85ab7d9e27a80e48d5b7d7fb2fe2b0fdb2de523
Status
affected
Version
9765319079131d6a6019caec661825808c6405f1
Status
affected
Version
c05f4f6485726faae08073f947368ee10439d3f0
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.18
Status
affected
Version <
5.18
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.235
Status
unaffected
Version <=
5.10.*
Version
5.10.173
Status
unaffected
Version <=
5.15.*
Version
5.15.99
Status
unaffected
Version <=
6.1.*
Version
6.1.16
Status
unaffected
Version <=
6.2.*
Version
6.2.3
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|