Description
In the Linux kernel, the following vulnerability has been resolved: crypto: api - Use work queue in crypto_destroy_instance The function crypto_drop_spawn expects to be called in process context. However, when an instance is unregistered while it still has active users, the last user may cause the instance to be freed in atomic context. Fix this by delaying the freeing to a work queue.
Product status
6bfd48096ff8ecabf955958b51ddfa7988eb0a14 (git) before 625bf86bf53eb7a8ee60fb9dc45b272b77e5ce1c
6bfd48096ff8ecabf955958b51ddfa7988eb0a14 (git) before 048545d9fc6424b0a11e7e8771225bb9afe09422
6bfd48096ff8ecabf955958b51ddfa7988eb0a14 (git) before c4cb61c5f976183c07d16b0071f0c60bc212ef1f
6bfd48096ff8ecabf955958b51ddfa7988eb0a14 (git) before 867a146690960ac7b89ce40f4ee60dd32eeb1682
6bfd48096ff8ecabf955958b51ddfa7988eb0a14 (git) before c0dbcebc7f390ec7dbe010dcc22c60f0c6bfc26d
6bfd48096ff8ecabf955958b51ddfa7988eb0a14 (git) before 9ae4577bc077a7e32c3c7d442c95bc76865c0f17
2.6.19
Any version before 2.6.19
5.10.195 (semver)
5.15.132 (semver)
6.1.53 (semver)
6.4.16 (semver)
6.5.3 (semver)
6.6 (original_commit_for_fix)
References
git.kernel.org/...c/625bf86bf53eb7a8ee60fb9dc45b272b77e5ce1c
git.kernel.org/...c/048545d9fc6424b0a11e7e8771225bb9afe09422
git.kernel.org/...c/c4cb61c5f976183c07d16b0071f0c60bc212ef1f
git.kernel.org/...c/867a146690960ac7b89ce40f4ee60dd32eeb1682
git.kernel.org/...c/c0dbcebc7f390ec7dbe010dcc22c60f0c6bfc26d
git.kernel.org/...c/9ae4577bc077a7e32c3c7d442c95bc76865c0f17