-

CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Use memcpy() for BIOS version

The strlcat() with FORTIFY support is triggering a panic because it
thinks the target buffer will overflow although the correct target
buffer size is passed in.

Anyway, instead of memset() with 0 followed by a strlcat(), just use
memcpy() and ensure that the resulting buffer is NULL terminated.

BIOSVersion is only used for the lpfc_printf_log() which expects a
properly terminated string.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b699bda5db818b684ff62d140defd6394f38f3d6
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < d34f2384d6df11a6c67039b612c2437f46e587e8
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 75ea8375c5a83f46c47bfb3de6217c7589a8df93
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 34c0a670556b24d36c9f8934227edb819ca5609e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2f63bf0d2b146956a2f2ff3b25cee71019e64561
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 003baa7a1a152576d744bd655820449bbdb0248e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ae82eaf4aeea060bb736c3e20c0568b67c701d7d
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.295
Status unaffected
Version <= 5.10.*
Version 5.10.239
Status unaffected
Version <= 5.15.*
Version 5.15.186
Status unaffected
Version <= 6.1.*
Version 6.1.142
Status unaffected
Version <= 6.6.*
Version 6.6.95
Status unaffected
Version <= 6.12.*
Version 6.12.35
Status unaffected
Version <= 6.15.*
Version 6.15.4
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.098
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string