Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-53055— fscrypt: destroy keyring after security_sb_delete()

EPSS 0.07% · P20
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-53055

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
fscrypt: destroy keyring after security_sb_delete()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: fscrypt: destroy keyring after security_sb_delete() fscrypt_destroy_keyring() must be called after all potentially-encrypted inodes were evicted; otherwise it cannot safely destroy the keyring. Since inodes that are in-use by the Landlock LSM don't get evicted until security_sb_delete(), this means that fscrypt_destroy_keyring() must be called *after* security_sb_delete(). This fixes a WARN_ON followed by a NULL dereference, only possible if Landlock was being used on encrypted files.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于fscrypt_destroy_keyring在security_sb_delete之前调用,可能导致空指针解引用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux e6f4fd85ef1ee6ab356bfbd64df28c1cb73aee7e ~ 992a3f3e8a0c92151dfdf65fc85567c865fd558a -
LinuxLinux 6.1 -

II. Public POCs for CVE-2023-53055

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-53055

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-05-02 · 107 CVEs total

CVE-2023-53102ice: xsk: disable txq irq before flushing hw
CVE-2023-53115scsi: mpi3mr: Fix memory leaks in mpi3mr_init_ioc()
CVE-2023-53114i40e: Fix kernel crash during reboot when adapter is in recovery mode
CVE-2023-53112drm/i915/sseu: fix max_subslices array-index-out-of-bounds access
CVE-2023-53113wifi: nl80211: fix NULL-ptr deref in offchan check
CVE-2023-53111loop: Fix use-after-free issues
CVE-2023-53109net: tunnels: annotate lockless accesses to dev->needed_headroom
CVE-2023-53110net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()
CVE-2023-53108net/iucv: Fix size of interrupt data
CVE-2023-53106nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition
CVE-2023-53107veth: Fix use after free in XDP_REDIRECT
CVE-2023-53105net/mlx5e: Fix cleanup null-ptr deref on encap lock
CVE-2023-53103bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
CVE-2023-53101ext4: zero i_disksize when initializing the bootloader inode
CVE-2023-53091ext4: update s_journal_inum if it changes after journal replay
CVE-2023-53094tty: serial: fsl_lpuart: fix race on RX DMA shutdown
CVE-2023-53092interconnect: exynos: fix node leak in probe PM QoS error path
CVE-2023-53093tracing: Do not let histogram values have some modifiers
CVE-2023-53095drm/ttm: Fix a NULL pointer dereference
CVE-2023-53090drm/amdkfd: Fix an illegal memory access

Showing top 20 of 107 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-53055

No comments yet


Leave a comment