CVE-2023-54108 — Release of Invalid Pointer or Reference in Linux
Severity
2.5LOW
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests
The following message and call trace was seen with debug kernels:
DMA-API: qla2xxx 0000:41:00.0: device driver failed to check map
error [device address=0x00000002a3ff38d8] [size=1024 bytes] [mapped as
single]
WARNING: CPU: 0 PID: 2930 at kernel/dma/debug.c:1017
check_unmap+0xf42/0x1990
Call Trace:
debug_dma_unmap_page+0xc9/0x100
qla_nvme_ls_unmap+0x141/0x210 [qla2xxx…
Affected Packages4 packages
▶CVEListV5linux/linux2d087c7e55db420107c3ea97b228e067a7b488a1 — 3a564de3a299856f2cbd289649cea2e20d671a43+8
🔴Vulnerability Details
3GHSA▶
GHSA-w45h-m4r8-m765: In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests
The following message↗2025-12-24
OSV▶
CVE-2023-54108: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests The following message an↗2025-12-24