CVE-2024-54456

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
27/02/2025
Last modified:
23/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()<br /> <br /> name is char[64] where the size of clnt-&gt;cl_program-&gt;name remains<br /> unknown. Invoking strcat() directly will also lead to potential buffer<br /> overflow. Change them to strscpy() and strncat() to fix potential<br /> issues.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.5 (including) 6.6.79 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.4 (excluding)