CVE-2023-53680
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the NFSD component where a function called OPDESC() is called with an invalid operation number (opnum) equal to OP_ILLEGAL (10044). OPDESC() indexes into an array nfsd4_ops[] without checking if the opnum is within valid bounds. The function nfsd4_decode_compound() can call OPDESC() with this out-of-bounds opnum, potentially causing unexpected behavior or errors.
How can this vulnerability impact me? :
Because OPDESC() is called with an out-of-bounds operation number, it can lead to undefined behavior such as memory corruption, crashes, or other security issues in the Linux kernel's NFS server component. This could potentially be exploited to disrupt services or compromise system stability.