{"id":"CVE-2025-38332","summary":"scsi: lpfc: Use memcpy() for BIOS version","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Use memcpy() for BIOS version\n\nThe strlcat() with FORTIFY support is triggering a panic because it\nthinks the target buffer will overflow although the correct target\nbuffer size is passed in.\n\nAnyway, instead of memset() with 0 followed by a strlcat(), just use\nmemcpy() and ensure that the resulting buffer is NULL terminated.\n\nBIOSVersion is only used for the lpfc_printf_log() which expects a\nproperly terminated string.","modified":"2026-04-16T04:34:07.636275978Z","published":"2025-07-10T08:15:05.102Z","related":["ALSA-2025:15008","ALSA-2025:15661","ALSA-2025:15782","SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38332.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/003baa7a1a152576d744bd655820449bbdb0248e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2f63bf0d2b146956a2f2ff3b25cee71019e64561"},{"type":"WEB","url":"https://git.kernel.org/stable/c/34c0a670556b24d36c9f8934227edb819ca5609e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/75ea8375c5a83f46c47bfb3de6217c7589a8df93"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ae82eaf4aeea060bb736c3e20c0568b67c701d7d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b699bda5db818b684ff62d140defd6394f38f3d6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d34f2384d6df11a6c67039b612c2437f46e587e8"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38332.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38332"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b3b4f3e1d575fe142fd437158425c2359b695ff1"},{"fixed":"ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d"},{"fixed":"b699bda5db818b684ff62d140defd6394f38f3d6"},{"fixed":"d34f2384d6df11a6c67039b612c2437f46e587e8"},{"fixed":"75ea8375c5a83f46c47bfb3de6217c7589a8df93"},{"fixed":"34c0a670556b24d36c9f8934227edb819ca5609e"},{"fixed":"2f63bf0d2b146956a2f2ff3b25cee71019e64561"},{"fixed":"003baa7a1a152576d744bd655820449bbdb0248e"},{"fixed":"ae82eaf4aeea060bb736c3e20c0568b67c701d7d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38332.json"}}],"schema_version":"1.7.5"}