PT-2026-27709 · Linux · Linux
Published
2026-03-25
·
Updated
2026-03-25
·
CVE-2026-23344
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
crypto: ccp - Fix use-after-free on error path
In the error path of sev tsm init locked(), the code dereferences 't'
after it has been freed with kfree(). The pr err() statement attempts
to access t->tio en and t->tio init done after the memory has been
released.
Move the pr err() call before kfree(t) to access the fields while the
memory is still valid.
This issue reported by Smatch static analyser
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux