๐Ÿ” CVE Alert

CVE-2025-38332

UNKNOWN 0.0

scsi: lpfc: Use memcpy() for BIOS version

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 10, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b3b4f3e1d575fe142fd437158425c2359b695ff1 < ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d b3b4f3e1d575fe142fd437158425c2359b695ff1 < b699bda5db818b684ff62d140defd6394f38f3d6 b3b4f3e1d575fe142fd437158425c2359b695ff1 < d34f2384d6df11a6c67039b612c2437f46e587e8 b3b4f3e1d575fe142fd437158425c2359b695ff1 < 75ea8375c5a83f46c47bfb3de6217c7589a8df93 b3b4f3e1d575fe142fd437158425c2359b695ff1 < 34c0a670556b24d36c9f8934227edb819ca5609e b3b4f3e1d575fe142fd437158425c2359b695ff1 < 2f63bf0d2b146956a2f2ff3b25cee71019e64561 b3b4f3e1d575fe142fd437158425c2359b695ff1 < 003baa7a1a152576d744bd655820449bbdb0248e b3b4f3e1d575fe142fd437158425c2359b695ff1 < ae82eaf4aeea060bb736c3e20c0568b67c701d7d
Linux / Linux
5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d git.kernel.org: https://git.kernel.org/stable/c/b699bda5db818b684ff62d140defd6394f38f3d6 git.kernel.org: https://git.kernel.org/stable/c/d34f2384d6df11a6c67039b612c2437f46e587e8 git.kernel.org: https://git.kernel.org/stable/c/75ea8375c5a83f46c47bfb3de6217c7589a8df93 git.kernel.org: https://git.kernel.org/stable/c/34c0a670556b24d36c9f8934227edb819ca5609e git.kernel.org: https://git.kernel.org/stable/c/2f63bf0d2b146956a2f2ff3b25cee71019e64561 git.kernel.org: https://git.kernel.org/stable/c/003baa7a1a152576d744bd655820449bbdb0248e git.kernel.org: https://git.kernel.org/stable/c/ae82eaf4aeea060bb736c3e20c0568b67c701d7d lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html