CVE-2025-38332

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

19 Dec 2025, 16:56

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/003baa7a1a152576d744bd655820449bbdb0248e - () https://git.kernel.org/stable/c/003baa7a1a152576d744bd655820449bbdb0248e - Patch
References () https://git.kernel.org/stable/c/2f63bf0d2b146956a2f2ff3b25cee71019e64561 - () https://git.kernel.org/stable/c/2f63bf0d2b146956a2f2ff3b25cee71019e64561 - Patch
References () https://git.kernel.org/stable/c/34c0a670556b24d36c9f8934227edb819ca5609e - () https://git.kernel.org/stable/c/34c0a670556b24d36c9f8934227edb819ca5609e - Patch
References () https://git.kernel.org/stable/c/75ea8375c5a83f46c47bfb3de6217c7589a8df93 - () https://git.kernel.org/stable/c/75ea8375c5a83f46c47bfb3de6217c7589a8df93 - Patch
References () https://git.kernel.org/stable/c/ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d - () https://git.kernel.org/stable/c/ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d - Patch
References () https://git.kernel.org/stable/c/ae82eaf4aeea060bb736c3e20c0568b67c701d7d - () https://git.kernel.org/stable/c/ae82eaf4aeea060bb736c3e20c0568b67c701d7d - Patch
References () https://git.kernel.org/stable/c/b699bda5db818b684ff62d140defd6394f38f3d6 - () https://git.kernel.org/stable/c/b699bda5db818b684ff62d140defd6394f38f3d6 - Patch
References () https://git.kernel.org/stable/c/d34f2384d6df11a6c67039b612c2437f46e587e8 - () https://git.kernel.org/stable/c/d34f2384d6df11a6c67039b612c2437f46e587e8 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Usar memcpy() para la versión de BIOS. La función strlcat() compatible con FORTIFY genera un pánico porque cree que el búfer de destino se desbordará, aunque se haya proporcionado el tamaño correcto. En cualquier caso, en lugar de usar memset() con 0 seguido de strlcat(), simplemente use memcpy() y asegúrese de que el búfer resultante termine en NULL. BIOSVersion solo se usa para lpfc_printf_log(), que espera una cadena con la terminación correcta.
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

10 Jul 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 09:15

Updated : 2025-12-19 16:56


NVD link : CVE-2025-38332

Mitre link : CVE-2025-38332

CVE.ORG link : CVE-2025-38332


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel