CVE-2023-53799

Source
https://cve.org/CVERecord?id=CVE-2023-53799
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53799.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53799
Downstream
Related
Published
2025-12-09T00:00:55.629Z
Modified
2026-03-31T17:29:52.388788976Z
Summary
crypto: api - Use work queue in crypto_destroy_instance
Details

In the Linux kernel, the following vulnerability has been resolved:

crypto: api - Use work queue in cryptodestroyinstance

The function cryptodropspawn expects to be called in process context. However, when an instance is unregistered while it still has active users, the last user may cause the instance to be freed in atomic context.

Fix this by delaying the freeing to a work queue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53799.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6bfd48096ff8ecabf955958b51ddfa7988eb0a14
Fixed
625bf86bf53eb7a8ee60fb9dc45b272b77e5ce1c
Fixed
048545d9fc6424b0a11e7e8771225bb9afe09422
Fixed
c4cb61c5f976183c07d16b0071f0c60bc212ef1f
Fixed
867a146690960ac7b89ce40f4ee60dd32eeb1682
Fixed
c0dbcebc7f390ec7dbe010dcc22c60f0c6bfc26d
Fixed
9ae4577bc077a7e32c3c7d442c95bc76865c0f17

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53799.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.19
Fixed
5.10.195
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.132
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.53
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.16
Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.5.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53799.json"