U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-54102 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow A static code analysis tool flagged the possibility of buffer overflow when using copy_from_user() for a debugfs entry. Currently, it is possible that copy_from_user() copies more bytes than what would fit in the mybuf char array. Add a min() restriction check between sizeof(mybuf) - 1 and nbytes passed from the userspace buffer to protect against buffer overflow.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/644a9d5e22761a41d5005a26996a643da96de962 kernel.org
https://git.kernel.org/stable/c/a9df88cb31dcbd72104ec5883f35cbc1fb587e47 kernel.org
https://git.kernel.org/stable/c/ad050f6cf681ebb850a9d4bc19474d3896476301 kernel.org
https://git.kernel.org/stable/c/c6087b82a9146826564a55c5ca0164cac40348f5 kernel.org
https://git.kernel.org/stable/c/e0e7faee3a7dd6f51350cda64997116a247eb045 kernel.org
https://git.kernel.org/stable/c/f91037487036e2d2f18d3c2481be6b9a366bde7f kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-54102
NVD Published Date:
12/24/2025
NVD Last Modified:
12/24/2025
Source:
kernel.org