-
CVE-2023-54108
- EPSS 0.05%
- Veröffentlicht 24.12.2025 13:06:32
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests The following message and call trace was seen with debug kernels: DMA-API: qla2xxx 0000:41:00.0: device driver failed to check map error [device address=0x00000002a3ff38d8] [size=1024 bytes] [mapped as single] WARNING: CPU: 0 PID: 2930 at kernel/dma/debug.c:1017 check_unmap+0xf42/0x1990 Call Trace: debug_dma_unmap_page+0xc9/0x100 qla_nvme_ls_unmap+0x141/0x210 [qla2xxx] Remove DMA mapping from the driver altogether, as it is already done by FC layer. This prevents the warning.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
2d087c7e55db420107c3ea97b228e067a7b488a1
Version <
3a564de3a299856f2cbd289649cea2e20d671a43
Status
affected
Version
0910a791a6d7fd331f231f48200e18babb519769
Version <
e596253113b69b4018818260bd5da40c201bee73
Status
affected
Version
c9d6081a5f18286ad62afc1e9e06a90cfd626902
Version <
77302fb0e357da666d5249a6e91078feeef3dade
Status
affected
Version
c85ab7d9e27a80e48d5b7d7fb2fe2b0fdb2de523
Version <
3ee4f1991c54c6707aa9df47e51c02ea25bb63e3
Status
affected
Version
c85ab7d9e27a80e48d5b7d7fb2fe2b0fdb2de523
Version <
ad6af23593594402c826eefdf43ae174e5f0f202
Status
affected
Version
c85ab7d9e27a80e48d5b7d7fb2fe2b0fdb2de523
Version <
c75e6aef5039830cce5d4cf764dd204522f89e6b
Status
affected
Version
9765319079131d6a6019caec661825808c6405f1
Status
affected
Version
c05f4f6485726faae08073f947368ee10439d3f0
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.18
Status
affected
Version
0
Version <
5.18
Status
unaffected
Version <=
5.4.*
Version
5.4.235
Status
unaffected
Version <=
5.10.*
Version
5.10.173
Status
unaffected
Version <=
5.15.*
Version
5.15.99
Status
unaffected
Version <=
6.1.*
Version
6.1.16
Status
unaffected
Version <=
6.2.*
Version
6.2.3
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.144 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|