Updated: 2026-02-27 03:24:11.69824
Description:
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() name is char[64] where the size of clnt->cl_program->name remains unknown. Invoking strcat() directly will also lead to potential buffer overflow. Change them to strscpy() and strncat() to fix potential issues.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.8 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 7.8 | HIGH | Not Vulnerable | 2025-11-18 06:53:54 | Affected function `nfs_sysfs_link_rpc_client` was introduced in v6.5-rc1 commit e13b54931 | |
| TuxCare 9.6 ESU | kernel | 5.14.0 | 7.8 | HIGH | Released | CLSA-2025:1766488019 | 2025-12-23 19:45:39 |