Impact
The vulnerability is a use‑after‑free in the Linux kernel’s crypto subsystem. The error path of sev_tsm_init_locked() dereferences a structure that has already been freed with kfree(). Accessing t->tio_en and t->tio_init_done after the memory release causes a kernel memory fault, resulting in a crash and a denial of service.
Affected Systems
Linux kernel binaries compiled from the vulnerable source tree are affected, including kernel releases 6.19 and all 7.0 release candidates (rc1 through rc7).
Risk and Exploitability
The CVSS score of 7.8 indicates high severity. The EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the flaw resides in kernel code and would generally require local privileged execution to trigger the error path. Even a single triggering event could crash the system, leading to a denial of service. The low EPSS suggests that widespread exploitation is unlikely at present.
OpenCVE Enrichment