Bug 2402213 (CVE-2023-53680) - CVE-2023-53680 kernel: NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL
Summary: CVE-2023-53680 kernel: NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILL...
Keywords:
Status: NEW
Alias: CVE-2023-53680
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-07 16:03 UTC by OSIDB Bzimport
Modified: 2026-01-14 09:47 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:23445 0 None None None 2025-12-17 07:47:04 UTC
Red Hat Product Errata RHSA-2026:0532 0 None None None 2026-01-14 00:20:22 UTC
Red Hat Product Errata RHSA-2026:0533 0 None None None 2026-01-14 00:13:44 UTC
Red Hat Product Errata RHSA-2026:0534 0 None None None 2026-01-14 00:09:26 UTC
Red Hat Product Errata RHSA-2026:0535 0 None None None 2026-01-14 00:28:45 UTC
Red Hat Product Errata RHSA-2026:0536 0 None None None 2026-01-14 00:19:17 UTC
Red Hat Product Errata RHSA-2026:0537 0 None None None 2026-01-14 00:07:30 UTC
Red Hat Product Errata RHSA-2026:0576 0 None None None 2026-01-14 09:47:42 UTC

Description OSIDB Bzimport 2025-10-07 16:03:20 UTC
In the Linux kernel, the following vulnerability has been resolved:

NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL

OPDESC() simply indexes into nfsd4_ops[] by the op's operation
number, without range checking that value. It assumes callers are
careful to avoid calling it with an out-of-bounds opnum value.

nfsd4_decode_compound() is not so careful, and can invoke OPDESC()
with opnum set to OP_ILLEGAL, which is 10044 -- well beyond the end
of nfsd4_ops[].

Comment 6 errata-xmlrpc 2025-12-17 07:47:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:23445 https://access.redhat.com/errata/RHSA-2025:23445

Comment 7 errata-xmlrpc 2026-01-14 00:07:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:0537 https://access.redhat.com/errata/RHSA-2026:0537

Comment 8 errata-xmlrpc 2026-01-14 00:09:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:0534 https://access.redhat.com/errata/RHSA-2026:0534

Comment 9 errata-xmlrpc 2026-01-14 00:13:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:0533 https://access.redhat.com/errata/RHSA-2026:0533

Comment 10 errata-xmlrpc 2026-01-14 00:19:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:0536 https://access.redhat.com/errata/RHSA-2026:0536

Comment 11 errata-xmlrpc 2026-01-14 00:20:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:0532 https://access.redhat.com/errata/RHSA-2026:0532

Comment 12 errata-xmlrpc 2026-01-14 00:28:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:0535 https://access.redhat.com/errata/RHSA-2026:0535

Comment 13 errata-xmlrpc 2026-01-14 09:47:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:0576 https://access.redhat.com/errata/RHSA-2026:0576


Note You need to log in before you can comment on or make changes to this bug.