CVE-2023-54108
Description
AI Translation Available
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests
The following message and call trace was seen with debug kernels:
DMA-API: qla2xxx 0000:41:00.0: device driver failed to check map
error [device address=0x00000002a3ff38d8] [size=1024 bytes] [mapped as
single]
WARNING: CPU: 0 PID: 2930 at kernel/dma/debug.c:1017
check_unmap+0xf42/0x1990
Call Trace:
debug_dma_unmap_page+0xc9/0x100
qla_nvme_ls_unmap+0x141/0x210 [qla2xxx]
Remove DMA mapping from the driver altogether, as it is already done by FC
layer. This prevents the warning.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0003
Percentile
0,1th
Updated
EPSS Score Trend (Last 82 Days)
https://git.kernel.org/stable/c/3a564de3a299856f2cbd289649cea2e20d671a43
https://git.kernel.org/stable/c/3ee4f1991c54c6707aa9df47e51c02ea25bb63e3
https://git.kernel.org/stable/c/77302fb0e357da666d5249a6e91078feeef3dade
https://git.kernel.org/stable/c/ad6af23593594402c826eefdf43ae174e5f0f202
https://git.kernel.org/stable/c/c75e6aef5039830cce5d4cf764dd204522f89e6b
https://git.kernel.org/stable/c/e596253113b69b4018818260bd5da40c201bee73