CVE-2023-53494
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
02/10/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: xts - Handle EBUSY correctly<br />
<br />
As it is xts only handles the special return value of EINPROGRESS,<br />
which means that in all other cases it will free data related to the<br />
request.<br />
<br />
However, as the caller of xts may specify MAY_BACKLOG, we also need<br />
to expect EBUSY and treat it in the same way. Otherwise backlogged<br />
requests will trigger a use-after-free.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/51c082514c2dedf2711c99d93c196cc4eedceb40
- https://git.kernel.org/stable/c/57c3e1d63b63dc0841d41df729297cd7c1c35808
- https://git.kernel.org/stable/c/912eb10b65646ffd222256c78a1c566a3dac177d
- https://git.kernel.org/stable/c/92a07ba4f0af2cccdc2aa5ee32679c9c9714db90
- https://git.kernel.org/stable/c/d5870848879291700fe6c5257dcb48aadd10425c



