Impact
A use‑after‑free condition exists in the Linux kernel’s crypto subsystem. During the error handling of sev_tsm_init_locked(), a freed structure is dereferenced, leading to a kernel memory violation. This can cause a kernel crash, denying service and potentially exposing the system to further exploitation if memory corruption is leveraged by an attacker.
Affected Systems
The vulnerability affects the Linux kernel. Specific product and version details are not listed; any kernel built from the affected source tree could be impacted.
Risk and Exploitability
The CVSS score is not provided, but the EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog. Exploitation would require triggering the specific error path in the ccp cryptographic module, which typically implies local or privileged access. The low EPSS suggests a small probability of widespread exploitation, though the kernel crash represents a serious availability impact.
OpenCVE Enrichment