Buffer Overflow Vulnerability in Linux Kernel SCSI Target Configuration
CVE-2025-39998

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
15 October 2025

What is CVE-2025-39998?

A vulnerability has been identified in the Linux kernel's SCSI target subsystem that can lead to a buffer overflow. This issue occurs in the target_lu_gp_members_show function within the target_core_configfs.c file, where snprintf is used to write data into a buffer (LU_GROUP_NAME_BUF) of fixed size (256 bytes). If the total formatted string length exceeds the allocated buffer size, this can lead to a buffer overflow during memory operations involving memcpy. By implementing an additional length check on the return value of snprintf, it is possible to mitigate this risk and enhance system security against potential exploitation.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 53c6351597e6a17ec6619f6f060d54128cb9a187

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-39998 : Buffer Overflow Vulnerability in Linux Kernel SCSI Target Configuration