CVE-2023-53241

Source
https://cve.org/CVERecord?id=CVE-2023-53241
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53241.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53241
Downstream
Related
Published
2025-09-15T14:23:09.750Z
Modified
2026-03-20T12:33:02.478354Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
nfsd: call op_release, even when op_func returns an error
Details

In the Linux kernel, the following vulnerability has been resolved:

nfsd: call oprelease, even when opfunc returns an error

For ops with "trivial" replies, nfsd4encodeoperation will shortcut most of the encoding work and skip to just marshalling up the status. One of the things it skips is calling op_release. This could cause a memory leak in the layoutget codepath if there is an error at an inopportune time.

Have the compound processing engine always call oprelease, even when opfunc sets an error in op->status. With this change, we also need nfsd4blockgetdeviceinfoscsi to set the gddevice pointer to NULL on error to avoid a double free.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53241.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
34b1744c91ccd44811005822106945fa80ecbff2
Fixed
65a33135e91e6dd661ecdf1194b9d90c49ae3570
Fixed
b11d8162c24af4a351d21e2c804d25ca493305e3
Fixed
b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3
Fixed
3d0dcada384af22dec764c8374a2997870ec86ae
Fixed
15a8b55dbb1ba154d82627547c5761cac884d810

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53241.json"