In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()
name is char[64] where the size of clnt->cl_program->name remains
unknown. Invoking strcat() directly will also lead to potential buffer
overflow. Change them to strscpy() and strncat() to fix potential
issues.
Metrics
Affected Vendors & Products
References
History
Thu, 27 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 27 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() name is char[64] where the size of clnt->cl_program->name remains unknown. Invoking strcat() directly will also lead to potential buffer overflow. Change them to strscpy() and strncat() to fix potential issues. | |
Title | NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-27T02:18:08.143Z
Updated: 2025-03-26T17:45:22.742Z
Reserved: 2025-02-27T02:16:34.098Z
Link: CVE-2024-54456

No data.

Status : Received
Published: 2025-02-27T03:15:10.667
Modified: 2025-02-27T03:15:10.667
Link: CVE-2024-54456
