CVE-2023-54102Classic Buffer Overflow in Linux

Severity
6.7MEDIUM
No vector
EPSS
0.0%
top 86.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow A static code analysis tool flagged the possibility of buffer overflow when using copy_from_user() for a debugfs entry. Currently, it is possible that copy_from_user() copies more bytes than what would fit in the mybuf char array. Add a min() restriction check between sizeof(mybuf) - 1 and nbytes passed from the userspace buffer to protect against buffer overfl

Affected Packages4 packages

Linuxlinux/linux_kernel5.1.05.4.244+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux6a828b0f6192b4930894925d1c1d0dc1f1d99e6e644a9d5e22761a41d5005a26996a643da96de962+6
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-hpjg-jc89-xqgf: In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow A static code2025-12-24
OSV
CVE-2023-54102: In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow A static code an2025-12-24
OSV
scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow2025-12-24
Debian
CVE-2023-54102: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc:...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54102 Impact, Exploitability, and Mitigation Steps | Wiz