PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-1652 Linux CVE debrief

CVE-2023-1652 is a use-after-free flaw in Linux kernel NFS server code that can let a local attacker crash the system or potentially expose kernel information. NVD lists it as high severity, with low attack complexity but requiring local privileges. The issue affects specific Linux kernel version ranges and is tracked by vendor and third-party advisories.

Vendor
Linux
Product
CVE-2023-1652
CVSS
HIGH 7.1
CISA KEV
Not listed in stored evidence
Original CVE published
2023-03-29
Original CVE updated
2026-05-12
Advisory published
2023-03-29
Advisory updated
2026-05-12

Who should care

Linux kernel maintainers, distribution security teams, system administrators running NFS services, and operators of hosts where local users or untrusted workloads may reach the kernel. This is especially relevant on affected kernel branches listed by NVD, because the flaw is local but can still lead to denial of service or information disclosure.

Technical summary

The flaw is a use-after-free in nfsd4_ssc_setup_dul within fs/nfsd/nfs4proc.c. NVD maps it to CWE-416 and gives it CVSS 3.1 vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H, which matches a local privilege-bearing attack path that can impact confidentiality and availability. NVD’s vulnerable CPE criteria include Linux kernel versions from 5.14 up to 5.15.91, from 5.16 up to 6.1.9, and Linux 6.2 release candidates rc1 through rc4; the record also lists Red Hat Enterprise Linux 9.0 as vulnerable in the provided metadata.

Defensive priority

High. Although exploitation requires local access and some privileges, the kernel-level impact is serious: system crash potential and possible kernel information leak. Prioritize patching or vendor remediation on any host running affected kernel builds, especially NFS-capable systems and multi-tenant environments.

Recommended defensive actions

  • Check whether any running Linux kernel falls within the affected ranges listed by NVD, including the 5.14-5.15.91, 5.16-6.1.9, and 6.2-rc1 through rc4 ranges in the advisory metadata.
  • Apply the vendor or distribution update referenced in the Red Hat advisory and any downstream security update that includes the fix.
  • Review NFS server exposure and limit local access to affected hosts until patched, especially where untrusted users, containers, or workloads may be present.
  • Monitor for kernel crashes or unexpected information leakage indicators on systems that cannot be updated immediately.
  • Confirm remediation using the vendor advisory and follow any distribution-specific backport guidance rather than relying only on upstream version numbers.

Evidence notes

This debrief is based only on the supplied NVD-derived record and official reference links. The CVE description states a use-after-free in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c with possible system crash or kernel information leak. NVD metadata provides the CVSS vector, CWE-416 mapping, vulnerable CPE ranges, and references to Red Hat, NetApp, and Siemens advisories. No exploit steps or unsupported impact claims are included.

Official resources

CVE published: 2023-03-29T21:15:07.997Z. CVE modified: 2026-05-12T10:16:39.377Z. The timeline here reflects the official CVE/NVD record dates only; no exploit publication or review date is being treated as the issue date. The record is not标