๐Ÿ” CVE Alert

CVE-2026-23344

UNKNOWN 0.0

crypto: ccp - Fix use-after-free on error path

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: crypto: ccp - Fix use-after-free on error path In the error path of sev_tsm_init_locked(), the code dereferences 't' after it has been freed with kfree(). The pr_err() statement attempts to access t->tio_en and t->tio_init_done after the memory has been released. Move the pr_err() call before kfree(t) to access the fields while the memory is still valid. This issue reported by Smatch static analyser

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 25, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4be423572da1f4c11f45168e3fafda870ddac9f8 < 79a26fe3175b9ed7c0c9541b197cb9786237c0f7 4be423572da1f4c11f45168e3fafda870ddac9f8 < 889b0e2721e793eb46cf7d17b965aa3252af3ec8
Linux / Linux
6.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/79a26fe3175b9ed7c0c9541b197cb9786237c0f7 git.kernel.org: https://git.kernel.org/stable/c/889b0e2721e793eb46cf7d17b965aa3252af3ec8