CVE-2023-53799
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/12/2025
Última modificación:
09/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: api - Use work queue in crypto_destroy_instance<br />
<br />
The function crypto_drop_spawn expects to be called in process<br />
context. However, when an instance is unregistered while it still<br />
has active users, the last user may cause the instance to be freed<br />
in atomic context.<br />
<br />
Fix this by delaying the freeing to a work queue.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/048545d9fc6424b0a11e7e8771225bb9afe09422
- https://git.kernel.org/stable/c/625bf86bf53eb7a8ee60fb9dc45b272b77e5ce1c
- https://git.kernel.org/stable/c/867a146690960ac7b89ce40f4ee60dd32eeb1682
- https://git.kernel.org/stable/c/9ae4577bc077a7e32c3c7d442c95bc76865c0f17
- https://git.kernel.org/stable/c/c0dbcebc7f390ec7dbe010dcc22c60f0c6bfc26d
- https://git.kernel.org/stable/c/c4cb61c5f976183c07d16b0071f0c60bc212ef1f



