CVE-2023-54244
Description
In the Linux kernel, the following vulnerability has been resolved:
ACPI: EC: Fix oops when removing custom query handlers
When removing custom query handlers, the handler might still be used inside the EC query workqueue, causing a kernel oops if the module holding the callback function was already unloaded.
Fix this by flushing the EC query workqueue when removing custom query handlers.
Tested on a Acer Travelmate 4002WLMi
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free in the Linux kernel's ACPI EC driver can cause a kernel oops when removing custom query handlers if the handler is still queued.
Vulnerability
CVE-2023-54244 is a use-after-free vulnerability in the Linux kernel's ACPI Embedded Controller (EC) driver. When a custom query handler is removed, the handler might still be used inside the EC query workqueue, causing a kernel oops if the module holding the callback function was already unloaded [1]. The root cause is that the removal of custom query handlers does not properly synchronize with the workqueue that may still be executing the handler.
Exploitation
An attacker would need to have the ability to load and unload kernel modules that register custom ACPI EC query handlers. This typically requires root privileges or the ability to trigger module unloading. The attack surface is limited to systems where such custom handlers are in use, and the prerequisite is that the handler's module is unloaded while a query is still pending or being processed.
Impact
If successfully triggered, the vulnerability leads to a kernel oops (a type of crash), which can cause a denial of service (system hang or reboot). There is no evidence of privilege escalation or data corruption described in the source material; the impact is limited to availability.
Mitigation
The fix, committed to the Linux kernel stable tree, flushes the EC query workqueue before removing custom query handlers, ensuring no handler callbacks are in flight [1][2][3]. Users should apply the corresponding kernel patch or update to a kernel version containing the fix. No workaround is mentioned in the references.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8130e3eac51910d528a7c421bccae2233e993066b90bca755f4a573eed63786a159fd5bdbfd2c99e81ae0e5b492c6bb90Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/066b90bca755f0b876e7b027b75d1796861d6db0nvd
- git.kernel.org/stable/c/0d528a7c421b1f1772fc1d29370b3b5fc0f42b19nvd
- git.kernel.org/stable/c/130e3eac51912f2c866e7d035992ede25f8feac0nvd
- git.kernel.org/stable/c/86a159fd5bdb01ec34b160cfda1a313b616d9302nvd
- git.kernel.org/stable/c/ccae2233e9935a038a35fe8cfd703df905f700e7nvd
- git.kernel.org/stable/c/e5b492c6bb900fcf9722e05f4a10924410e170c1nvd
- git.kernel.org/stable/c/f4a573eed6377d356f835a4b00099d5dacee0da0nvd
- git.kernel.org/stable/c/fd2c99e81ae0dbdd62a154ef9c77fc01715cc020nvd
News mentions
0No linked articles in our index yet.