Updated: 2026-02-08 04:15:07.835525
Description:
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow A static code analysis tool flagged the possibility of buffer overflow when using copy_from_user() for a debugfs entry. Currently, it is possible that copy_from_user() copies more bytes than what would fit in the mybuf char array. Add a min() restriction check between sizeof(mybuf) - 1 and nbytes passed from the userspace buffer to protect against buffer overflow.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | NONE | 0.0 |
| CVSS Version 3.x | MEDIUM | 6.7 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 6.7 | MEDIUM | In Testing | 2026-01-28 20:33:04 | ||
| CentOS 8.4 ELS | kernel | 4.18.0 | 6.7 | MEDIUM | Ignored | 2026-02-09 20:32:45 | This flaw exists only in a lpfc driver debugfs write handler and is reachable solely via local, high... | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 6.7 | MEDIUM | Ignored | 2026-02-09 20:32:46 | This flaw exists only in a lpfc driver debugfs write handler and is reachable solely via local, high... |