In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.
2025-07-10T09:15:27.680
2025-12-19T16:56:27.610
Analyzed
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 5.5 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 5.4.295 | Yes |
| Operating System | linux | linux_kernel | < 5.10.239 | Yes |
| Operating System | linux | linux_kernel | < 5.15.186 | Yes |
| Operating System | linux | linux_kernel | < 6.1.142 | Yes |
| Operating System | linux | linux_kernel | < 6.6.95 | Yes |
| Operating System | linux | linux_kernel | < 6.12.35 | Yes |
| Operating System | linux | linux_kernel | < 6.15.4 | Yes |
| Operating System | debian | debian_linux | 11.0 | Yes |