-
CVE-2023-53241
- EPSS 0.02%
- Veröffentlicht 15.09.2025 14:23:09
- Zuletzt bearbeitet 15.09.2025 15:22:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: nfsd: call op_release, even when op_func returns an error For ops with "trivial" replies, nfsd4_encode_operation will shortcut most of the encoding work and skip to just marshalling up the status. One of the things it skips is calling op_release. This could cause a memory leak in the layoutget codepath if there is an error at an inopportune time. Have the compound processing engine always call op_release, even when op_func sets an error in op->status. With this change, we also need nfsd4_block_get_device_info_scsi to set the gd_device pointer to NULL on error to avoid a double free.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
65a33135e91e6dd661ecdf1194b9d90c49ae3570
Version
34b1744c91ccd44811005822106945fa80ecbff2
Status
affected
Version <
b11d8162c24af4a351d21e2c804d25ca493305e3
Version
34b1744c91ccd44811005822106945fa80ecbff2
Status
affected
Version <
b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3
Version
34b1744c91ccd44811005822106945fa80ecbff2
Status
affected
Version <
3d0dcada384af22dec764c8374a2997870ec86ae
Version
34b1744c91ccd44811005822106945fa80ecbff2
Status
affected
Version <
15a8b55dbb1ba154d82627547c5761cac884d810
Version
34b1744c91ccd44811005822106945fa80ecbff2
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.14
Status
affected
Version <
4.14
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.220
Status
unaffected
Version <=
5.15.*
Version
5.15.154
Status
unaffected
Version <=
6.1.*
Version
6.1.24
Status
unaffected
Version <=
6.2.*
Version
6.2.11
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.048 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|