In the Linux kernel, the following vulnerability has been resolved:
NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL
OPDESC() simply indexes into nfsd4_ops[] by the op's operation
number, without range checking that value. It assumes callers are
careful to avoid calling it with an out-of-bounds opnum value.
nfsd4_decode_compound() is not so careful, and can invoke OPDESC()
with opnum set to OP_ILLEGAL, which is 10044 -- well beyond the end
of nfsd4_ops[].
References
Configurations
Configuration 1 (hide)
|
History
03 Feb 2026, 18:26
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/50827896c365e0f6c8b55ed56d444dafd87c92c5 - Patch | |
| References | () https://git.kernel.org/stable/c/804d8e0a6e54427268790472781e03bc243f4ee3 - Patch | |
| References | () https://git.kernel.org/stable/c/a64160124d5a078be0c380b1e8a0bad2d040d3a1 - Patch | |
| References | () https://git.kernel.org/stable/c/f352c41fa718482979e7e6b71b4da2b718e381cc - Patch | |
| References | () https://git.kernel.org/stable/c/ffcbcf087581ae68ddc0a21460f7ecd4315bdd0e - Patch | |
| First Time |
Linux linux Kernel
Linux |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-787 |
Information
Published : 2025-10-07 16:15
Updated : 2026-02-03 18:26
NVD link : CVE-2023-53680
Mitre link : CVE-2023-53680
CVE.ORG link : CVE-2023-53680
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
