CVE-2023-53373

Updated: 2026-01-16 00:50:56.051153

Description:

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1762171389 2025-11-03 17:12:30
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Released CLSA-2026:1768669128 2026-01-28 12:41:56
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2025:1766617167 2026-01-12 18:58:30
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1763731262 2025-11-21 21:34:16
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1763734783 2025-11-21 21:34:17
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1763722365 2025-11-21 21:34:15
CloudLinux 7 ELS kernel 3.10.0 7.8 HIGH Ignored 2025-12-27 05:31:54 CloudLinux 6 and 7 support is limited and provided on demand. We strongly recommend upgrading to Clo...
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Released CLSA-2026:1769610819 2026-01-28 21:07:09
Oracle Linux 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2025:1766599987 2025-12-25 15:19:40
Oracle Linux 7 ELS kernel-uek 5.4.17 7.8 HIGH Already Fixed 2026-02-03 16:54:34
Total: 15