In the Linux kernel, the following vulnerability has been resolved:
NFSv4.2: Rework scratch handling for READ_PLUS (again)
I found that the read code might send multiple requests using the same
nfs_pgio_header, but nfs4_proc_read_setup() is only called once. This is
how we ended up occasionally double-freeing the scratch buffer, but also
means we set a NULL pointer but non-zero length to the xdr scratch
buffer. This results in an oops the first time decoding needs to copy
something to scratch, which frequently happens when decoding READ_PLUS
hole segments.
I fix this by moving scratch handling into the pageio read code. I
provide a function to allocate scratch space for decoding read replies,
and free the scratch buffer when the nfs_pgio_header is freed.
References
Configurations
Configuration 1 (hide)
|
History
11 Dec 2025, 19:30
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-415 | |
| References | () https://git.kernel.org/stable/c/303a78052091c81e9003915c521fdca1c7e117af - Patch | |
| References | () https://git.kernel.org/stable/c/a2f4cb206bd94b3f4a7bb05fcdce9525283b5681 - Patch | |
| References | () https://git.kernel.org/stable/c/adac9f0ddd2b291c7ce41f549fdb27a13616cff5 - Patch | |
| References | () https://git.kernel.org/stable/c/ae5d5672f1db711e91db6f52df5cb16ecd8f5692 - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
17 Sep 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-17 15:15
Updated : 2025-12-11 19:30
NVD link : CVE-2023-53360
Mitre link : CVE-2023-53360
CVE.ORG link : CVE-2023-53360
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free
