CVE-2023-53241

In the Linux kernel, the following vulnerability has been resolved: nfsd: call op_release, even when op_func returns an error For ops with "trivial" replies, nfsd4_encode_operation will shortcut most of the encoding work and skip to just marshalling up the status. One of the things it skips is calling op_release. This could cause a memory leak in the layoutget codepath if there is an error at an inopportune time. Have the compound processing engine always call op_release, even when op_func sets an error in op->status. With this change, we also need nfsd4_block_get_device_info_scsi to set the gd_device pointer to NULL on error to avoid a double free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*

History

03 Dec 2025, 19:45

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/15a8b55dbb1ba154d82627547c5761cac884d810 - () https://git.kernel.org/stable/c/15a8b55dbb1ba154d82627547c5761cac884d810 - Patch
References () https://git.kernel.org/stable/c/3d0dcada384af22dec764c8374a2997870ec86ae - () https://git.kernel.org/stable/c/3d0dcada384af22dec764c8374a2997870ec86ae - Patch
References () https://git.kernel.org/stable/c/65a33135e91e6dd661ecdf1194b9d90c49ae3570 - () https://git.kernel.org/stable/c/65a33135e91e6dd661ecdf1194b9d90c49ae3570 - Patch
References () https://git.kernel.org/stable/c/b11d8162c24af4a351d21e2c804d25ca493305e3 - () https://git.kernel.org/stable/c/b11d8162c24af4a351d21e2c804d25ca493305e3 - Patch
References () https://git.kernel.org/stable/c/b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3 - () https://git.kernel.org/stable/c/b623a8e5d38a69a3ef8644acb1030dd7c7bc28b3 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-401

Information

Published : 2025-09-15 15:15

Updated : 2025-12-03 19:45


NVD link : CVE-2023-53241

Mitre link : CVE-2023-53241

CVE.ORG link : CVE-2023-53241


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime