CVE-2023-53373

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53373
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53373.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53373
Downstream
Related
Published
2025-09-18T13:33:20.264Z
Modified
2025-11-28T02:35:20.484186Z
Summary
crypto: seqiv - Handle EBUSY correctly
Details

In the Linux kernel, the following vulnerability has been resolved:

crypto: seqiv - Handle EBUSY correctly

As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request.

However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53373.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0a270321dbf948963aeb0e8382fe17d2c2eb3771
Fixed
cc4d0d4251748a8a68026938f4055d2ac47c5719
Fixed
1effbddaff60eeef8017c6dea1ee0ed970164d14
Fixed
63551e4b7cbcd9914258827699eb2cb6ed6e4a16
Fixed
ae849d2f48019ff9c104e32bf588ccbfb200e971
Fixed
36ec108b7bd7e280edb22de028467bd09d644620
Fixed
4d497e8b200a175094e0ac252ed878add39b8771
Fixed
9477db935eb690f697d9bcc4f608927841bc8b36
Fixed
32e62025e5e52fbe4812ef044759de7010b15dbc

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.25
Fixed
4.14.308
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.276
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.235
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3