CVE-2023-53494
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's crypto subsystem, specifically in the xts module. The issue is that xts only handles the EINPROGRESS return value correctly, but it does not properly handle the EBUSY return value when the caller specifies MAY_BACKLOG. This can cause backlogged requests to trigger a use-after-free error, which means the system might free data that is still in use, potentially leading to crashes or other unexpected behavior.
How can this vulnerability impact me? :
The vulnerability can lead to use-after-free conditions in the Linux kernel's crypto xts module. This can cause system instability, crashes, or potentially allow attackers to exploit the kernel memory corruption to execute arbitrary code or cause denial of service.