
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability (CVE-2025-39998) was discovered in the Linux kernel's SCSI target subsystem. The vulnerability was identified in the targetlugpmembersshow function located in /drivers/target/targetcoreconfigfs.c. The issue was disclosed and patched on October 15, 2025 (NVD).
The vulnerability stems from improper buffer size validation when using snprintf to write into a buffer named 'buf' in the targetlugpmembersshow function. The buffer is allocated with a fixed size of LUGROUPNAME_BUF (256 bytes), but the function attempts to format multiple strings including the HBA name, a slash character, a device name, and a newline character, which could exceed the buffer size. Since snprintf returns the total number of bytes that would have been written, this value may exceed the buffer length passed to memcpy, resulting in a buffer overflow condition (NVD).
A successful exploitation of this buffer overflow vulnerability could lead to memory corruption in the Linux kernel. This could potentially result in system crashes, denial of service conditions, or possible privilege escalation depending on the specific exploitation method (NVD).
The vulnerability has been patched by adding a length check to avoid the buffer overflow condition. System administrators are advised to update their Linux kernel to the latest version that includes this security fix (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."