CVE-2023-53680
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
07/10/2025
Last modified:
03/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL<br />
<br />
OPDESC() simply indexes into nfsd4_ops[] by the op&#39;s operation<br />
number, without range checking that value. It assumes callers are<br />
careful to avoid calling it with an out-of-bounds opnum value.<br />
<br />
nfsd4_decode_compound() is not so careful, and can invoke OPDESC()<br />
with opnum set to OP_ILLEGAL, which is 10044 -- well beyond the end<br />
of nfsd4_ops[].
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14 (including) | 5.10.220 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.107 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.2.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/50827896c365e0f6c8b55ed56d444dafd87c92c5
- https://git.kernel.org/stable/c/804d8e0a6e54427268790472781e03bc243f4ee3
- https://git.kernel.org/stable/c/a64160124d5a078be0c380b1e8a0bad2d040d3a1
- https://git.kernel.org/stable/c/f352c41fa718482979e7e6b71b4da2b718e381cc
- https://git.kernel.org/stable/c/ffcbcf087581ae68ddc0a21460f7ecd4315bdd0e



