In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025071033-CVE-2025-38332-9590@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:14003 https://access.redhat.com/errata/RHSA-2025:14003
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:14005 https://access.redhat.com/errata/RHSA-2025:14005
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:15008 https://access.redhat.com/errata/RHSA-2025:15008
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:15646 https://access.redhat.com/errata/RHSA-2025:15646
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:15647 https://access.redhat.com/errata/RHSA-2025:15647
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:15648 https://access.redhat.com/errata/RHSA-2025:15648
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions Via RHSA-2025:15649 https://access.redhat.com/errata/RHSA-2025:15649
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:15661 https://access.redhat.com/errata/RHSA-2025:15661
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:15668 https://access.redhat.com/errata/RHSA-2025:15668
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:15782 https://access.redhat.com/errata/RHSA-2025:15782
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:17159 https://access.redhat.com/errata/RHSA-2025:17159