vulnerability
Ubuntu: (CVE-2023-53241): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Sep 16, 2025 | Sep 19, 2025 | Dec 5, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved: nfsd: call op_release, even when op_func returns an error For ops with "trivial" replies, nfsd4_encode_operation will shortcut most of the encoding work and skip to just marshalling up the status. One of the things it skips is calling op_release. This could cause a memory leak in the layoutget codepath if there is an error at an inopportune time. Have the compound processing engine always call op_release, even when op_func sets an error in op->status. With this change, we also need nfsd4_block_get_device_info_scsi to set the gd_device pointer to NULL on error to avoid a double free.
Solutions
References
- CVE-2023-53241
- https://attackerkb.com/topics/CVE-2023-53241
- CWE-401
- URL-https://git.kernel.org/linus/15a8b55dbb1ba154d82627547c5761cac884d810
- URL-https://git.kernel.org/stable/c/15a8b55dbb1ba154d82627547c5761cac884d810
- URL-https://git.kernel.org/stable/c/3d0dcada384af22dec764c8374a2997870ec86ae
- URL-https://git.kernel.org/stable/c/65a33135e91e6dd661ecdf1194b9d90c49ae3570
- URL-https://git.kernel.org/stable/c/b11d8162c24af4a351d21e2c804d25ca493305e3
- URL-https://git.kernel.org/stable/c/b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3
- URL-https://www.cve.org/CVERecord?id=CVE-2023-53241
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.