In the Linux kernel, the following vulnerability has been resolved:
NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL
OPDESC() simply indexes into nfsd4_ops[] by the op's operation
number, without range checking that value. It assumes callers are
careful to avoid calling it with an out-of-bounds opnum value.
nfsd4_decode_compound() is not so careful, and can invoke OPDESC()
with opnum set to OP_ILLEGAL, which is 10044 -- well beyond the end
of nfsd4_ops[].
Metrics
Affected Vendors & Products
References
History
Tue, 07 Oct 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL OPDESC() simply indexes into nfsd4_ops[] by the op's operation number, without range checking that value. It assumes callers are careful to avoid calling it with an out-of-bounds opnum value. nfsd4_decode_compound() is not so careful, and can invoke OPDESC() with opnum set to OP_ILLEGAL, which is 10044 -- well beyond the end of nfsd4_ops[]. | |
Title | NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-07T15:21:34.626Z
Reserved: 2025-10-07T15:16:59.664Z
Link: CVE-2023-53680

No data.

Status : Received
Published: 2025-10-07T16:15:52.160
Modified: 2025-10-07T16:15:52.160
Link: CVE-2023-53680

No data.

No data.