In the Linux kernel, the following vulnerability has been resolved:
NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL
OPDESC() simply indexes into nfsd4_ops[] by the op's operation number, without range checking that value. It assumes callers are careful to avoid calling it with an out-of-bounds opnum value.
nfsd4decodecompound() is not so careful, and can invoke OPDESC() with opnum set to OPILLEGAL, which is 10044 -- well beyond the end of nfsd4ops[].
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53680.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53680.json"
[
{
"signature_version": "v1",
"target": {
"file": "fs/nfsd/nfs4xdr.c",
"function": "nfsd4_decode_compound"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@804d8e0a6e54427268790472781e03bc243f4ee3",
"deprecated": false,
"digest": {
"function_hash": "155268081879453169872971261683330792302",
"length": 2261.0
},
"id": "CVE-2023-53680-4d6a08cb",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "fs/nfsd/nfs4xdr.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@804d8e0a6e54427268790472781e03bc243f4ee3",
"deprecated": false,
"digest": {
"line_hashes": [
"216491313908720752335025789012849286449",
"91311389279698169682531434392331828996",
"111407096689225899908643126702185437860",
"329408709555436577291362229835846527684",
"103712400830134837854304266048008866041",
"267083638653584274575740817495665287662",
"227021877470189433130429956618647675494",
"324272607901037087312512257141692396179",
"184203241275226155518292852529780153648",
"108339332949473579797235336703051947368",
"290616411751846114814926244853072135852"
],
"threshold": 0.9
},
"id": "CVE-2023-53680-79383373",
"signature_type": "Line"
}
]