CVE-2023-53680

Source
https://cve.org/CVERecord?id=CVE-2023-53680
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53680.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53680
Downstream
Related
Published
2025-10-07T15:21:34.626Z
Modified
2026-03-20T12:33:17.759380Z
Summary
NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL
Details

In the Linux kernel, the following vulnerability has been resolved:

NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL

OPDESC() simply indexes into nfsd4_ops[] by the op's operation number, without range checking that value. It assumes callers are careful to avoid calling it with an out-of-bounds opnum value.

nfsd4decodecompound() is not so careful, and can invoke OPDESC() with opnum set to OPILLEGAL, which is 10044 -- well beyond the end of nfsd4ops[].

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53680.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f4f9ef4a1b0a1ca80b152e28e176d69515bdf7e8
Fixed
50827896c365e0f6c8b55ed56d444dafd87c92c5
Fixed
a64160124d5a078be0c380b1e8a0bad2d040d3a1
Fixed
ffcbcf087581ae68ddc0a21460f7ecd4315bdd0e
Fixed
f352c41fa718482979e7e6b71b4da2b718e381cc
Fixed
804d8e0a6e54427268790472781e03bc243f4ee3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53680.json"