{"id":"CVE-2023-53799","summary":"crypto: api - Use work queue in crypto_destroy_instance","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: api - Use work queue in crypto_destroy_instance\n\nThe function crypto_drop_spawn expects to be called in process\ncontext.  However, when an instance is unregistered while it still\nhas active users, the last user may cause the instance to be freed\nin atomic context.\n\nFix this by delaying the freeing to a work queue.","modified":"2026-03-31T17:29:52.388788976Z","published":"2025-12-09T00:00:55.629Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53799.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/048545d9fc6424b0a11e7e8771225bb9afe09422"},{"type":"WEB","url":"https://git.kernel.org/stable/c/625bf86bf53eb7a8ee60fb9dc45b272b77e5ce1c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/867a146690960ac7b89ce40f4ee60dd32eeb1682"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9ae4577bc077a7e32c3c7d442c95bc76865c0f17"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c0dbcebc7f390ec7dbe010dcc22c60f0c6bfc26d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c4cb61c5f976183c07d16b0071f0c60bc212ef1f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53799.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53799"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6bfd48096ff8ecabf955958b51ddfa7988eb0a14"},{"fixed":"625bf86bf53eb7a8ee60fb9dc45b272b77e5ce1c"},{"fixed":"048545d9fc6424b0a11e7e8771225bb9afe09422"},{"fixed":"c4cb61c5f976183c07d16b0071f0c60bc212ef1f"},{"fixed":"867a146690960ac7b89ce40f4ee60dd32eeb1682"},{"fixed":"c0dbcebc7f390ec7dbe010dcc22c60f0c6bfc26d"},{"fixed":"9ae4577bc077a7e32c3c7d442c95bc76865c0f17"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53799.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.19"},{"fixed":"5.10.195"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.132"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.53"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.5.0"},{"fixed":"6.5.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53799.json"}}],"schema_version":"1.7.5"}