CVE-2026-43493
Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: pcrypt - Fix handling of MAY_BACKLOG requests
MAY_BACKLOG requests can return EBUSY. Handle them by checking for that value and filtering out EINPROGRESS notifications.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel crypto pcrypt missing EBUSY handling for MAY_BACKLOG requests can cause use-after-free or crash.
Vulnerability
In the Linux kernel's crypto/pcrypt subsystem, a flaw exists in how MAY_BACKLOG requests are handled. Requests with the MAY_BACKLOG flag can return -EBUSY when the crypto backend is congested; however, the pcrypt code did not check for this return value and incorrectly filtered out EINPROGRESS notifications. This bug affects multiple stable kernel versions as indicated by the patches anchored at commits [1], [2], [3], and [4].
Exploitation
An attacker able to submit MAY_BACKLOG requests to the pcrypt subsystem (e.g., via a local process making AF_ALG socket calls or through other crypto operations that reach pcrypt) can trigger a race condition. When the backend returns -EBUSY, the missing error handling causes the request to be treated as completed prematurely, potentially leading to use of freed memory or double completion. No special privileges are required if the attacker has local access and the kernel is configured with pcrypt.
Impact
Successful exploitation can lead to memory corruption, a kernel crash (denial of service), or potentially arbitrary code execution due to use-after-free of crypto request structures. The CVSS v3 score of 9.8 (Critical) reflects the possibility of remote exploitation if the attack surface is reachable over the network, though the primary vector is local. The impact includes complete loss of confidentiality, integrity, and availability.
Mitigation
The vulnerability is fixed by applying the kernel patches referenced in commits [1], [2], [3], and [4]. System administrators should update to the latest stable kernels containing these fixes as soon as possible. If a kernel update is not immediately feasible, the pcrypt module can be blacklisted via /etc/modprobe.d/blacklist.conf as a workaround, provided it is not required for operation. No evidence of inclusion in CISA's Known Exploited Vulnerabilities (KEV) catalog was found at the time of writing.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
10eb34e243df5777d55bc8675e915b692e6cb746271895ddfb9f1cbca178c09f1cbca178c046271895ddfb77d55bc8675e915b692e6cb7eb34e243df57Vulnerability mechanics
Root cause
"Missing handling of EBUSY return from MAY_BACKLOG crypto requests in pcrypt, causing EINPROGRESS notifications to be incorrectly filtered."
Attack vector
An attacker can trigger this bug by submitting crypto requests with the MAY_BACKLOG flag set to the pcrypt subsystem. When the crypto backend is busy, such requests return EBUSY instead of EINPROGRESS. The pcrypt completion handler fails to recognize EBUSY as a valid return, leading to missed or incorrect completion notifications. This can cause the submitting process to hang indefinitely waiting for a completion that will never arrive, or to misinterpret the request state.
Affected code
The vulnerability exists in the pcrypt completion handler within the Linux kernel's crypto subsystem. The patch files (patch_ids 602980-602984) modify the pcrypt request completion logic to properly handle EBUSY return values from MAY_BACKLOG requests. The exact function names and file paths are not specified in the advisory, but the changes are in the pcrypt (parallel crypto) layer.
What the fix does
The patch adds explicit handling for the EBUSY return value that MAY_BACKLOG requests can produce. In the pcrypt completion path, the code now checks for EBUSY and treats it similarly to EINPROGRESS, ensuring that backlogged requests receive proper completion notifications. The fix also filters out duplicate EINPROGRESS notifications that could previously occur when a request was both backlogged and in progress. This closes the gap where a MAY_BACKLOG request returning EBUSY would be silently dropped without any completion signal.
Preconditions
- inputAttacker must be able to submit crypto requests with the MAY_BACKLOG flag set to the pcrypt subsystem.
- configThe crypto backend must be under sufficient load that it returns EBUSY for backlogged requests.
Generated on May 19, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/46271895ddfb1ba41f89f7e0dffbe9c2bcf7380anvd
- git.kernel.org/stable/c/77d55bc8675ee851ed639dc9be77325a8024cf67nvd
- git.kernel.org/stable/c/915b692e6cb723aac658c25eb82c58fd81235110nvd
- git.kernel.org/stable/c/9f1cbca178c03188e201ed175251372149bb25f2nvd
- git.kernel.org/stable/c/eb34e243df57e32f4c08fa191f3602ea19076276nvd
News mentions
0No linked articles in our index yet.