In the Linux kernel, the following vulnerability has been resolved:
crypto: xts - Handle EBUSY correctly
As it is xts only handles the special return value of EINPROGRESS, which means that in all other cases it will free data related to the request.
However, as the caller of xts may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
[
{
"id": "CVE-2023-53494-6de4fad5",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@912eb10b65646ffd222256c78a1c566a3dac177d",
"signature_type": "Function",
"digest": {
"function_hash": "308907558739424480123922311560154825651",
"length": 421.0
},
"deprecated": false,
"target": {
"function": "xts_decrypt_done",
"file": "crypto/xts.c"
}
},
{
"id": "CVE-2023-53494-a198fb12",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@912eb10b65646ffd222256c78a1c566a3dac177d",
"signature_type": "Function",
"digest": {
"function_hash": "35429897299124670210487791243785742567",
"length": 420.0
},
"deprecated": false,
"target": {
"function": "xts_encrypt_done",
"file": "crypto/xts.c"
}
},
{
"id": "CVE-2023-53494-b2f99c8f",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@912eb10b65646ffd222256c78a1c566a3dac177d",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"139592130116796033666713258426027413652",
"103132670829190811467281736351145609582",
"268651470947103369749963274832052461972",
"301419850888754091197282791470655317148",
"14127993095342552932803263487725376383",
"328444676035519655821347226847632411128",
"240064759925465604975994469528867173672",
"295929603046567226677046772655018639210",
"139592130116796033666713258426027413652",
"333003279407241654790961526783066371384",
"316359095655851516353982396071502945480",
"116746205772751539263050454790935014755",
"98385305211795098179811196598024177839",
"122743566254762054209403305611825205680",
"297881150946052021349925318902764295626",
"295929603046567226677046772655018639210"
]
},
"deprecated": false,
"target": {
"file": "crypto/xts.c"
}
},
{
"id": "CVE-2023-53494-cda969a4",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57c3e1d63b63dc0841d41df729297cd7c1c35808",
"signature_type": "Function",
"digest": {
"function_hash": "308907558739424480123922311560154825651",
"length": 421.0
},
"deprecated": false,
"target": {
"function": "xts_decrypt_done",
"file": "crypto/xts.c"
}
},
{
"id": "CVE-2023-53494-d05f7c9a",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57c3e1d63b63dc0841d41df729297cd7c1c35808",
"signature_type": "Function",
"digest": {
"function_hash": "35429897299124670210487791243785742567",
"length": 420.0
},
"deprecated": false,
"target": {
"function": "xts_encrypt_done",
"file": "crypto/xts.c"
}
},
{
"id": "CVE-2023-53494-d53a0957",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57c3e1d63b63dc0841d41df729297cd7c1c35808",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"139592130116796033666713258426027413652",
"103132670829190811467281736351145609582",
"268651470947103369749963274832052461972",
"301419850888754091197282791470655317148",
"14127993095342552932803263487725376383",
"328444676035519655821347226847632411128",
"240064759925465604975994469528867173672",
"295929603046567226677046772655018639210",
"139592130116796033666713258426027413652",
"333003279407241654790961526783066371384",
"316359095655851516353982396071502945480",
"116746205772751539263050454790935014755",
"98385305211795098179811196598024177839",
"122743566254762054209403305611825205680",
"297881150946052021349925318902764295626",
"295929603046567226677046772655018639210"
]
},
"deprecated": false,
"target": {
"file": "crypto/xts.c"
}
}
]