CVE-2023-54046
Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: essiv - Handle EBUSY correctly
As it is essiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request.
However, as the caller of essiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's crypto essiv module, failure to handle EBUSY return values can cause a use-after-free when requests are backlogged.
Root
Cause The vulnerability resides in the Linux kernel's crypto essiv module, where the essiv_skcipher_crypt function incorrectly handles return values from the underlying cipher. Specifically, it only treats EINPROGRESS as a special case, freeing associated data for all other return values. However, when the caller specifies MAY_BACKLOG, the kernel can return EBUSY for backlogged requests. Because EBUSY is not treated like EINPROGRESS, the data is freed prematurely, leading to a use-after-free condition [1][2][3].
Exploitation
An attacker must be able to submit crypto requests through the kernel's crypto API with the MAY_BACKLOG flag set and trigger the essiv module. This typically requires local access to the system, as the crypto subsystem is accessible to unprivileged users via interfaces like AF_ALG or certain device drivers. The attacker does not need authentication beyond local user privileges [1].
Impact
A successful exploit allows an attacker to cause a use-after-free on kernel memory, which can be leveraged for local privilege escalation or denial of service (system crash). The use-after-free corrupts kernel structures, potentially enabling arbitrary code execution with kernel privileges [1][2].
Mitigation
The vulnerability is fixed in Linux kernel stable releases by patches that add proper handling for the EBUSY return code in the essiv module [1][2][3]. Users should apply the latest kernel updates from their distribution or compile a patched kernel. No workarounds are known.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
6c61e7d182ee3796e02cca30a840a1d3b77c1a006aa3eedb869c67d451fc1b5a772adf45aVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/69c67d451fc19d88e54f7d97e8e7c093e08357e1nvd
- git.kernel.org/stable/c/796e02cca30a67322161f0745e5ce994bbe75605nvd
- git.kernel.org/stable/c/840a1d3b77c1b062bd62b4733969a5b1efc274cenvd
- git.kernel.org/stable/c/a006aa3eedb8bfd6fe317c3cfe9c86ffe76b2385nvd
- git.kernel.org/stable/c/b5a772adf45a32c68bef28e60621f12617161556nvd
- git.kernel.org/stable/c/c61e7d182ee3f3f5ecf18a2964e303d49c539b52nvd
News mentions
0No linked articles in our index yet.