{"id":"CVE-2023-54108","summary":"scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests\n\nThe following message and call trace was seen with debug kernels:\n\nDMA-API: qla2xxx 0000:41:00.0: device driver failed to check map\nerror [device address=0x00000002a3ff38d8] [size=1024 bytes] [mapped as\nsingle]\nWARNING: CPU: 0 PID: 2930 at kernel/dma/debug.c:1017\n\t check_unmap+0xf42/0x1990\n\nCall Trace:\n\tdebug_dma_unmap_page+0xc9/0x100\n\tqla_nvme_ls_unmap+0x141/0x210 [qla2xxx]\n\nRemove DMA mapping from the driver altogether, as it is already done by FC\nlayer. This prevents the warning.","modified":"2026-04-02T09:45:36.016885Z","published":"2025-12-24T13:06:32.184Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54108.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3a564de3a299856f2cbd289649cea2e20d671a43"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3ee4f1991c54c6707aa9df47e51c02ea25bb63e3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/77302fb0e357da666d5249a6e91078feeef3dade"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ad6af23593594402c826eefdf43ae174e5f0f202"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c75e6aef5039830cce5d4cf764dd204522f89e6b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e596253113b69b4018818260bd5da40c201bee73"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54108.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54108"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2d087c7e55db420107c3ea97b228e067a7b488a1"},{"fixed":"3a564de3a299856f2cbd289649cea2e20d671a43"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0910a791a6d7fd331f231f48200e18babb519769"},{"fixed":"e596253113b69b4018818260bd5da40c201bee73"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c9d6081a5f18286ad62afc1e9e06a90cfd626902"},{"fixed":"77302fb0e357da666d5249a6e91078feeef3dade"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c85ab7d9e27a80e48d5b7d7fb2fe2b0fdb2de523"},{"fixed":"3ee4f1991c54c6707aa9df47e51c02ea25bb63e3"},{"fixed":"ad6af23593594402c826eefdf43ae174e5f0f202"},{"fixed":"c75e6aef5039830cce5d4cf764dd204522f89e6b"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"9765319079131d6a6019caec661825808c6405f1"},{"last_affected":"c05f4f6485726faae08073f947368ee10439d3f0"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54108.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.235"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.173"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.99"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.18.0"},{"fixed":"6.2.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54108.json"}}],"schema_version":"1.7.5"}