CVE-2023-54102
Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow
A static code analysis tool flagged the possibility of buffer overflow when using copy_from_user() for a debugfs entry.
Currently, it is possible that copy_from_user() copies more bytes than what would fit in the mybuf char array. Add a min() restriction check between sizeof(mybuf) - 1 and nbytes passed from the userspace buffer to protect against buffer overflow.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A buffer overflow in lpfc_debugfs_lockstat_write() allows copying more data than the destination buffer can hold, fixed by adding a min() check fixes it.
Vulnerability
In the Linux kernel's SCSI lpfc driver, the function lpfc_debugfs_lockstat_write() is used to handle writes to a debugfs entry. A static code analysis tool identified that copy_from_user() could copy more bytes than the size of the local buffer mybuf, leading to a buffer overflow. The fix adds a min() restriction to ensure that the number of bytes copied is limited to sizeof(mybuf) - 1 [1][2][3].
Exploitation
An attacker with local access and the ability to write to the debugfs file system could trigger this overflow by providing a large input. No special privileges beyond the ability to write to debugfs are required, as the debugfs entry is typically accessible to unprivileged users in some configurations.
Impact
A successful buffer overflow could corrupt kernel memory, potentially leading to a denial of service (system crash) or, in some cases, privilege escalation. The vulnerability is considered moderate severity.
Mitigation
The fix has been applied to the Linux kernel stable branches. Users should update to a kernel version containing the commit that adds the min() restriction. No workaround is available other than restricting access to debugfs.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
6644a9d5e2276e0e7faee3a7df91037487036a9df88cb31dcad050f6cf681c6087b82a914Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/644a9d5e22761a41d5005a26996a643da96de962nvd
- git.kernel.org/stable/c/a9df88cb31dcbd72104ec5883f35cbc1fb587e47nvd
- git.kernel.org/stable/c/ad050f6cf681ebb850a9d4bc19474d3896476301nvd
- git.kernel.org/stable/c/c6087b82a9146826564a55c5ca0164cac40348f5nvd
- git.kernel.org/stable/c/e0e7faee3a7dd6f51350cda64997116a247eb045nvd
- git.kernel.org/stable/c/f91037487036e2d2f18d3c2481be6b9a366bde7fnvd
News mentions
0No linked articles in our index yet.