CVE-2023-53810
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/12/2025
Última modificación:
09/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
blk-mq: release crypto keyslot before reporting I/O complete<br />
<br />
Once all I/O using a blk_crypto_key has completed, filesystems can call<br />
blk_crypto_evict_key(). However, the block layer currently doesn&#39;t call<br />
blk_crypto_put_keyslot() until the request is being freed, which happens<br />
after upper layers have been told (via bio_endio()) the I/O has<br />
completed. This causes a race condition where blk_crypto_evict_key()<br />
can see &#39;slot_refs != 0&#39; without there being an actual bug.<br />
<br />
This makes __blk_crypto_evict_key() hit the<br />
&#39;WARN_ON_ONCE(atomic_read(&slot->slot_refs) != 0)&#39; and return without<br />
doing anything, eventually causing a use-after-free in<br />
blk_crypto_reprogram_all_keys(). (This is a very rare bug and has only<br />
been seen when per-file keys are being used with fscrypt.)<br />
<br />
There are two options to fix this: either release the keyslot before<br />
bio_endio() is called on the request&#39;s last bio, or make<br />
__blk_crypto_evict_key() ignore slot_refs. Let&#39;s go with the first<br />
solution, since it preserves the ability to report bugs (via<br />
WARN_ON_ONCE) where a key is evicted while still in-use.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/7d206ec7a04e8545828191b6ea8b49d3ea61391f
- https://git.kernel.org/stable/c/874bdf43b4a7dc5463c31508f62b3e42eb237b08
- https://git.kernel.org/stable/c/92d5d233b9ff531cf9cc36ab4251779e07adb633
- https://git.kernel.org/stable/c/9cd1e566676bbcb8a126acd921e4e194e6339603
- https://git.kernel.org/stable/c/b278570e2c59d538216f8b656e97680188a8fba4
- https://git.kernel.org/stable/c/d206f79d9cd658665b37ce8134c6ec849ac7af0c



