CVE-2023-53606

Source
https://cve.org/CVERecord?id=CVE-2023-53606
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53606.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53606
Downstream
Published
2025-10-04T15:44:15.908Z
Modified
2026-03-20T12:33:15.358706Z
Summary
nfsd: clean up potential nfsd_file refcount leaks in COPY codepath
Details

In the Linux kernel, the following vulnerability has been resolved:

nfsd: clean up potential nfsd_file refcount leaks in COPY codepath

There are two different flavors of the nfsd4copy struct. One is embedded in the compound and is used directly in synchronous copies. The other is dynamically allocated, refcounted and tracked in the client struture. For the embedded one, the cleanup just involves releasing any nfsdfiles held on its behalf. For the async one, the cleanup is a bit more involved, and we need to dequeue it from lists, unhash it, etc.

There is at least one potential refcount leak in this code now. If the kthreadcreate call fails, then both the src and dst nfsdfiles in the original nfsd4_copy object are leaked.

The cleanup in this codepath is also sort of weird. In the async copy case, we'll have up to four nfsdfile references (src and dst for both flavors of copy structure). They are both put at the end of nfsd4doasynccopy, even though the ones held on behalf of the embedded one outlive that structure.

Change it so that we always clean up the nfsdfile refs held by the embedded copy structure before nfsd4copy returns. Rework cleanupasynccopy to handle both inter and intra copies. Eliminate nfsd4cleanupintra_ssc since it now becomes a no-op.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53606.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e0639dc5805a9d4faaa2c07ad98fa853b9529dd3
Fixed
fd63299db8090307eae66f2aef17c8f00aafa0a9
Fixed
b3169b6ffe036b549c296a9e71591d29a1fb3209
Fixed
75b8c681c563ef7e85da6862354efc18d2a08b1b
Fixed
8f565846fbe8182961498d4cbe618b15076a683b
Fixed
6ba434cb1a8d403ea9aad1b667c3ea3ad8b3191f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53606.json"