-
CVE-2023-53241
- EPSS 0.02%
- Published 15.09.2025 14:23:09
- Last modified 15.09.2025 15:22:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: nfsd: call op_release, even when op_func returns an error For ops with "trivial" replies, nfsd4_encode_operation will shortcut most of the encoding work and skip to just marshalling up the status. One of the things it skips is calling op_release. This could cause a memory leak in the layoutget codepath if there is an error at an inopportune time. Have the compound processing engine always call op_release, even when op_func sets an error in op->status. With this change, we also need nfsd4_block_get_device_info_scsi to set the gd_device pointer to NULL on error to avoid a double free.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
65a33135e91e6dd661ecdf1194b9d90c49ae3570
Version
34b1744c91ccd44811005822106945fa80ecbff2
Status
affected
Version <
b11d8162c24af4a351d21e2c804d25ca493305e3
Version
34b1744c91ccd44811005822106945fa80ecbff2
Status
affected
Version <
b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3
Version
34b1744c91ccd44811005822106945fa80ecbff2
Status
affected
Version <
3d0dcada384af22dec764c8374a2997870ec86ae
Version
34b1744c91ccd44811005822106945fa80ecbff2
Status
affected
Version <
15a8b55dbb1ba154d82627547c5761cac884d810
Version
34b1744c91ccd44811005822106945fa80ecbff2
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.14
Status
affected
Version <
4.14
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.220
Status
unaffected
Version <=
5.15.*
Version
5.15.154
Status
unaffected
Version <=
6.1.*
Version
6.1.24
Status
unaffected
Version <=
6.2.*
Version
6.2.11
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.048 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|