PT-2026-27709 · Linux · Linux

Published

2026-03-25

·

Updated

2026-03-25

·

CVE-2026-23344

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
crypto: ccp - Fix use-after-free on error path
In the error path of sev tsm init locked(), the code dereferences 't' after it has been freed with kfree(). The pr err() statement attempts to access t->tio en and t->tio init done after the memory has been released.
Move the pr err() call before kfree(t) to access the fields while the memory is still valid.
This issue reported by Smatch static analyser

Related Identifiers

CVE-2026-23344

Affected Products

Linux