Acknowledged
Created: Jul 11, 2025
Updated: Jul 14, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]scsi: lpfc: Use memcpy() for BIOS version[EOL][EOL]The strlcat() with FORTIFY support is triggering a panic because it[EOL]thinks the target buffer will overflow although the correct target[EOL]buffer size is passed in.[EOL][EOL]Anyway, instead of memset() with 0 followed by a strlcat(), just use[EOL]memcpy() and ensure that the resulting buffer is NULL terminated.[EOL][EOL]BIOSVersion is only used for the lpfc_printf_log() which expects a[EOL]properly terminated string.
CREATE(Triage):(User=admin) [CVE-2025-38332 (https://nvd.nist.gov/vuln/detail/CVE-2025-38332)