CVE-2023-53241
15.09.2025, 15:15
In the Linux kernel, the following vulnerability has been resolved: nfsd: call op_release, even when op_func returns an error For ops with "trivial" replies, nfsd4_encode_operation will shortcut most of the encoding work and skip to just marshalling up the status. One of the things it skips is calling op_release. This could cause a memory leak in the layoutget codepath if there is an error at an inopportune time. Have the compound processing engine always call op_release, even when op_func sets an error in op->status. With this change, we also need nfsd4_block_get_device_info_scsi to set the gd_device pointer to NULL on error to avoid a double free.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.14 ≤ 𝑥 < 5.10.220 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.154 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.24 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.2.11 |
| linux | linux_kernel | 6.3:rc1 |
| linux | linux_kernel | 6.3:rc2 |
| linux | linux_kernel | 6.3:rc3 |
| linux | linux_kernel | 6.3:rc4 |
| linux | linux_kernel | 6.3:rc5 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References