In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix potential buffer overflowin nfssysfslinkrpcclient()
name is char[64] where the size of clnt->cl_program->name remains unknown. Invoking strcat() directly will also lead to potential buffer overflow. Change them to strscpy() and strncat() to fix potential issues.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/54xxx/CVE-2024-54456.json"
}[
{
"digest": {
"length": 407.0,
"function_hash": "277963309032696413289506489360141782015"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2024-54456-916cc8a7",
"target": {
"function": "nfs_sysfs_link_rpc_client",
"file": "fs/nfs/sysfs.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e8e0eb5601d4a6c74c336e3710afe3a0348c469d"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"150810446637451827191901109846504612284",
"130350454903567984440283625052468093899",
"68395454594408567472129573223160052734",
"13164673608563102393539142079239317214",
"21228245208934234354781415570397020098",
"275264448885811976370390428751963963229"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-54456-d4f76360",
"target": {
"file": "fs/nfs/sysfs.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e8e0eb5601d4a6c74c336e3710afe3a0348c469d"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-54456.json"