CVE-2023-53680

Source
https://cve.org/CVERecord?id=CVE-2023-53680
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53680.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53680
Downstream
Related
Published
2025-10-07T15:21:34.626Z
Modified
2026-04-11T12:46:51.722453Z
Summary
NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL
Details

In the Linux kernel, the following vulnerability has been resolved:

NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL

OPDESC() simply indexes into nfsd4_ops[] by the op's operation number, without range checking that value. It assumes callers are careful to avoid calling it with an out-of-bounds opnum value.

nfsd4decodecompound() is not so careful, and can invoke OPDESC() with opnum set to OPILLEGAL, which is 10044 -- well beyond the end of nfsd4ops[].

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53680.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f4f9ef4a1b0a1ca80b152e28e176d69515bdf7e8
Fixed
50827896c365e0f6c8b55ed56d444dafd87c92c5
Fixed
a64160124d5a078be0c380b1e8a0bad2d040d3a1
Fixed
ffcbcf087581ae68ddc0a21460f7ecd4315bdd0e
Fixed
f352c41fa718482979e7e6b71b4da2b718e381cc
Fixed
804d8e0a6e54427268790472781e03bc243f4ee3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53680.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.14.0
Fixed
5.10.220
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.107
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.24
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.11

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53680.json"