Impact
The Linux kernel’s cryptographic subsystem contains a flaw where a MAY_BACKLOG request may return EBUSY, but the error is not properly handled, causing EINPROGRESS notifications to be filtered incorrectly. This improper error handling can lead to cryptographic operations hanging or being retried unnecessarily, potentially degrading system performance or causing resource exhaustion. The weakness is a failure to validate return codes and improper resource cleanup, aligning with CWE‑770.
Affected Systems
This issue affects the Linux kernel across all supported architectures because the patch references the generic crypto: pcrypt interface. The advisory does not enumerate specific kernel versions, so any release containing the unpatched code is potentially vulnerable. System administrators should check their kernel version against the vendor release notes to confirm whether the fix has been applied.
Risk and Exploitability
The advisory lists a CVSS score of 9.8 and an EPSS score of < 1 %, and the vulnerability is not listed in CISA KEV. Based on the description, it is inferred that the flaw could be exploited by a local attacker with kernel access to disrupt cryptographic services or, when combined with other kernel bugs, potentially contribute to privilege escalation. The impact remains local and depends on the system’s use of the pcrypt interface.
OpenCVE Enrichment