CVE-2023-53536Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: blk-crypto: make blk_crypto_evict_key() more robust If blk_crypto_evict_key() sees that the key is still in-use (due to a bug) or that ->keyslot_evict failed, it currently just returns while leaving the key linked into the keyslot management structures. However, blk_crypto_evict_key() is only called in contexts such as inode eviction where failure is not an option. So actually the caller proceeds with freeing the blk_crypto_k

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.85.10.180+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux1b2628397058ebce7277480960b29c788138de90701a8220762ff90615dc91d3543f789391b63298+6
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53536: In the Linux kernel, the following vulnerability has been resolved: blk-crypto: make blk_crypto_evict_key() more robust If blk_crypto_evict_key() sees2025-10-04
GHSA
GHSA-f2cg-q42r-r6f6: In the Linux kernel, the following vulnerability has been resolved: blk-crypto: make blk_crypto_evict_key() more robust If blk_crypto_evict_key() se2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: blk-crypto: make blk_crypto_evict_key() more robust2025-10-04
Debian
CVE-2023-53536: linux - In the Linux kernel, the following vulnerability has been resolved: blk-crypto:...2023