-
CVE-2023-53810
- EPSS 0.02%
- Veröffentlicht 09.12.2025 00:01:08
- Zuletzt bearbeitet 09.12.2025 18:37:13
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: blk-mq: release crypto keyslot before reporting I/O complete Once all I/O using a blk_crypto_key has completed, filesystems can call blk_crypto_evict_key(). However, the block layer currently doesn't call blk_crypto_put_keyslot() until the request is being freed, which happens after upper layers have been told (via bio_endio()) the I/O has completed. This causes a race condition where blk_crypto_evict_key() can see 'slot_refs != 0' without there being an actual bug. This makes __blk_crypto_evict_key() hit the 'WARN_ON_ONCE(atomic_read(&slot->slot_refs) != 0)' and return without doing anything, eventually causing a use-after-free in blk_crypto_reprogram_all_keys(). (This is a very rare bug and has only been seen when per-file keys are being used with fscrypt.) There are two options to fix this: either release the keyslot before bio_endio() is called on the request's last bio, or make __blk_crypto_evict_key() ignore slot_refs. Let's go with the first solution, since it preserves the ability to report bugs (via WARN_ON_ONCE) where a key is evicted while still in-use.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
874bdf43b4a7dc5463c31508f62b3e42eb237b08
Version
a892c8d52c02284076fbbacae6692aa5c5807d11
Status
affected
Version <
d206f79d9cd658665b37ce8134c6ec849ac7af0c
Version
a892c8d52c02284076fbbacae6692aa5c5807d11
Status
affected
Version <
7d206ec7a04e8545828191b6ea8b49d3ea61391f
Version
a892c8d52c02284076fbbacae6692aa5c5807d11
Status
affected
Version <
b278570e2c59d538216f8b656e97680188a8fba4
Version
a892c8d52c02284076fbbacae6692aa5c5807d11
Status
affected
Version <
92d5d233b9ff531cf9cc36ab4251779e07adb633
Version
a892c8d52c02284076fbbacae6692aa5c5807d11
Status
affected
Version <
9cd1e566676bbcb8a126acd921e4e194e6339603
Version
a892c8d52c02284076fbbacae6692aa5c5807d11
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.8
Status
affected
Version <
5.8
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.180
Status
unaffected
Version <=
5.15.*
Version
5.15.111
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.058 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|