๐Ÿ” CVE Alert

CVE-2023-53055

UNKNOWN 0.0

fscrypt: destroy keyring after security_sb_delete()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fscrypt: destroy keyring after security_sb_delete() fscrypt_destroy_keyring() must be called after all potentially-encrypted inodes were evicted; otherwise it cannot safely destroy the keyring. Since inodes that are in-use by the Landlock LSM don't get evicted until security_sb_delete(), this means that fscrypt_destroy_keyring() must be called *after* security_sb_delete(). This fixes a WARN_ON followed by a NULL dereference, only possible if Landlock was being used on encrypted files.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 2, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e6f4fd85ef1ee6ab356bfbd64df28c1cb73aee7e < 992a3f3e8a0c92151dfdf65fc85567c865fd558a d7e7b9af104c7b389a0c21eb26532511bce4b510 < d77531fac6a1fd9f1db0195438ba5419d72b96c4 d7e7b9af104c7b389a0c21eb26532511bce4b510 < 497ab5d9c7852dfedab2c9de75e41b60e54b7c5d d7e7b9af104c7b389a0c21eb26532511bce4b510 < ccb820dc7d2236b1af0d54ae038a27b5b6d5ae5a 391cceee6d435e616f68631e68f5b32d480b1e67 68d15d6558a386f46d815a6ac39edecad713a1bf
Linux / Linux
6.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/992a3f3e8a0c92151dfdf65fc85567c865fd558a git.kernel.org: https://git.kernel.org/stable/c/d77531fac6a1fd9f1db0195438ba5419d72b96c4 git.kernel.org: https://git.kernel.org/stable/c/497ab5d9c7852dfedab2c9de75e41b60e54b7c5d git.kernel.org: https://git.kernel.org/stable/c/ccb820dc7d2236b1af0d54ae038a27b5b6d5ae5a