CVE-2026-23344

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
25/03/2026
Last modified:
24/04/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> crypto: ccp - Fix use-after-free on error path<br /> <br /> In the error path of sev_tsm_init_locked(), the code dereferences &amp;#39;t&amp;#39;<br /> after it has been freed with kfree(). The pr_err() statement attempts<br /> to access t-&gt;tio_en and t-&gt;tio_init_done after the memory has been<br /> released.<br /> <br /> Move the pr_err() call before kfree(t) to access the fields while the<br /> memory is still valid.<br /> <br /> This issue reported by Smatch static analyser

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19.1 (including) 6.19.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.19:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*