CVE-2025-38332

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38332
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38332.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38332
Downstream
Related
Published
2025-07-10T09:15:27Z
Modified
2025-08-12T21:01:38Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Use memcpy() for BIOS version

The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in.

Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated.

BIOSVersion is only used for the lpfcprintflog() which expects a properly terminated string.

References

Affected packages