CVE-2023-53810
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's block layer involves a race condition related to the handling of crypto keyslots used for disk encryption. Specifically, the kernel delays releasing a crypto keyslot until after the I/O request is reported as complete to upper layers. This timing allows a function that evicts keys to see the keyslot as still in use, triggering a warning and skipping the eviction. This can eventually lead to a rare use-after-free bug when per-file encryption keys are used, potentially causing memory safety issues.
How can this vulnerability impact me? :
The vulnerability can cause a rare use-after-free condition in the kernel when using per-file encryption keys, which may lead to memory corruption or instability in the system. This could potentially be exploited to cause crashes or other unintended behavior in the kernel, affecting system reliability and security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Linux kernel to a version that includes the fix where the blk_crypto_keyslot is released before bio_endio() is called on the request's last bio. This prevents the race condition and use-after-free issue. Since this is a kernel-level fix, applying the latest kernel patches or updates from your Linux distribution is the recommended immediate step.