CVE-2023-53606
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a potential reference count (refcount) leak in the Linux kernel's NFS daemon (nfsd) COPY codepath. Specifically, there are two types of nfsd4_copy structures used for synchronous and asynchronous file copying. If the kernel thread creation (kthread_create) fails during the asynchronous copy, the source and destination nfsd_file references in the original nfsd4_copy object are leaked, meaning they are not properly released. This can lead to resource leaks and improper cleanup of file references.
How can this vulnerability impact me? :
This vulnerability can cause resource leaks in the Linux kernel's NFS daemon, potentially leading to increased memory usage or exhaustion of file references. Over time, this could degrade system performance or stability, especially on systems heavily using NFS file copying operations. However, there is no indication of direct security impact such as privilege escalation or data corruption.