CVE-2023-53799
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's crypto API where the function crypto_drop_spawn is expected to be called in process context. However, if a crypto instance is unregistered while it still has active users, the last user might cause the instance to be freed in atomic context, which is unsafe. The fix involves delaying the freeing operation by using a work queue to ensure it happens in the correct context.
How can this vulnerability impact me? :
If exploited or triggered, this vulnerability could lead to improper freeing of resources in atomic context, potentially causing kernel instability, crashes, or other unpredictable behavior in systems using the affected Linux kernel crypto API.