๐Ÿ” CVE Alert

CVE-2023-54276

UNKNOWN 0.0

nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net Commit f5f9d4a314da ("nfsd: move reply cache initialization into nfsd startup") moved the initialization of the reply cache into nfsd startup, but didn't account for the stats counters, which can be accessed before nfsd is ever started. The result can be a NULL pointer dereference when someone accesses /proc/fs/nfsd/reply_cache_stats while nfsd is still shut down. This is a regression and a user-triggerable oops in the right situation: - non-x86_64 arch - /proc/fs/nfsd is mounted in the namespace - nfsd is not started in the namespace - unprivileged user calls "cat /proc/fs/nfsd/reply_cache_stats" Although this is easy to trigger on some arches (like aarch64), on x86_64, calling this_cpu_ptr(NULL) evidently returns a pointer to the fixed_percpu_data. That struct looks just enough like a newly initialized percpu var to allow nfsd_reply_cache_stats_show to access it without Oopsing. Move the initialization of the per-net+per-cpu reply-cache counters back into nfsd_init_net, while leaving the rest of the reply cache allocations to be done at nfsd startup time. Kudos to Eirik who did most of the legwork to track this down.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 30, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4e18b58b106e34ac69d3052dd91f520bd83cf2fc < 3025d489f9c8984d1bf5916c4a20097ed80fca5c 70fdee548c036c6bdb496f284c9e78f1654b6dd0 < 8549384d0f65981761fe2077d04fa2a8d37b54e0 e7e571ed4ec7bb50136233d8e7b986efef2af8c1 < 66a178177b2b3bb1d71e854c5e7bbb320eb0e566 f5f9d4a314da88c0a5faa6d168bf69081b7a25ae < 768c408594b52d8531e1a8ab62e5620c19213e73 f5f9d4a314da88c0a5faa6d168bf69081b7a25ae < ed9ab7346e908496816cffdecd46932035f66e2e
Linux / Linux
6.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3025d489f9c8984d1bf5916c4a20097ed80fca5c git.kernel.org: https://git.kernel.org/stable/c/8549384d0f65981761fe2077d04fa2a8d37b54e0 git.kernel.org: https://git.kernel.org/stable/c/66a178177b2b3bb1d71e854c5e7bbb320eb0e566 git.kernel.org: https://git.kernel.org/stable/c/768c408594b52d8531e1a8ab62e5620c19213e73 git.kernel.org: https://git.kernel.org/stable/c/ed9ab7346e908496816cffdecd46932035f66e2e