-
CVE-2023-54276
- EPSS 0.03%
- Veröffentlicht 30.12.2025 12:16:05
- Zuletzt bearbeitet 31.12.2025 20:42:43
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net
Commit f5f9d4a314da ("nfsd: move reply cache initialization into nfsd
startup") moved the initialization of the reply cache into nfsd startup,
but didn't account for the stats counters, which can be accessed before
nfsd is ever started. The result can be a NULL pointer dereference when
someone accesses /proc/fs/nfsd/reply_cache_stats while nfsd is still
shut down.
This is a regression and a user-triggerable oops in the right situation:
- non-x86_64 arch
- /proc/fs/nfsd is mounted in the namespace
- nfsd is not started in the namespace
- unprivileged user calls "cat /proc/fs/nfsd/reply_cache_stats"
Although this is easy to trigger on some arches (like aarch64), on
x86_64, calling this_cpu_ptr(NULL) evidently returns a pointer to the
fixed_percpu_data. That struct looks just enough like a newly
initialized percpu var to allow nfsd_reply_cache_stats_show to access
it without Oopsing.
Move the initialization of the per-net+per-cpu reply-cache counters
back into nfsd_init_net, while leaving the rest of the reply cache
allocations to be done at nfsd startup time.
Kudos to Eirik who did most of the legwork to track this down.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
3025d489f9c8984d1bf5916c4a20097ed80fca5c
Version
4e18b58b106e34ac69d3052dd91f520bd83cf2fc
Status
affected
Version <
8549384d0f65981761fe2077d04fa2a8d37b54e0
Version
70fdee548c036c6bdb496f284c9e78f1654b6dd0
Status
affected
Version <
66a178177b2b3bb1d71e854c5e7bbb320eb0e566
Version
e7e571ed4ec7bb50136233d8e7b986efef2af8c1
Status
affected
Version <
768c408594b52d8531e1a8ab62e5620c19213e73
Version
f5f9d4a314da88c0a5faa6d168bf69081b7a25ae
Status
affected
Version <
ed9ab7346e908496816cffdecd46932035f66e2e
Version
f5f9d4a314da88c0a5faa6d168bf69081b7a25ae
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.3
Status
affected
Version <
6.3
Version
0
Status
unaffected
Version <=
6.4.*
Version
6.4.4
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.065 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|