CVE-2023-53494Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: xts - Handle EBUSY correctly As it is xts only handles the special return value of EINPROGRESS, which means that in all other cases it will free data related to the request. However, as the caller of xts may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.45.10.173+3
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux8083b1bf8163e7ae7d8c90f221106d96450b8aa892a07ba4f0af2cccdc2aa5ee32679c9c9714db90+5
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3646-gh58-xhcx: In the Linux kernel, the following vulnerability has been resolved: crypto: xts - Handle EBUSY correctly As it is xts only handles the special retur2025-10-01
OSV
CVE-2023-53494: In the Linux kernel, the following vulnerability has been resolved: crypto: xts - Handle EBUSY correctly As it is xts only handles the special return2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: crypto: xts - Handle EBUSY correctly2025-10-01
Debian
CVE-2023-53494: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: xts...2023