CVE-2024-54456

Updated: 2026-02-27 03:24:11.69824

Description:

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() name is char[64] where the size of clnt->cl_program->name remains unknown. Invoking strcat() directly will also lead to potential buffer overflow. Change them to strscpy() and strncat() to fix potential issues.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Not Vulnerable 2025-11-18 06:53:54 Affected function `nfs_sysfs_link_rpc_client` was introduced in v6.5-rc1 commit e13b54931
TuxCare 9.6 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1766488019 2025-12-23 19:45:39