Impact
A flaw in the Atmel SHA204a crypto driver of the Linux kernel can cause the tfm_count counter to be decremented after a memory allocation failure. This incorrect counter modification leads to a resource counter leak and can block subsequent read operations, effectively turning normal crypto requests into delayed or frozen ones. The weakness involves improper resource release, as identified by CWE‑911.
Affected Systems
The vulnerability affects any Linux kernel that includes the Atmel SHA204a driver before the patch series referenced in the advisory. No explicit version list is supplied, so every kernel containing the buggy code path is potentially impacted until the update is applied.
Risk and Exploitability
The CVSS score is not disclosed, yet the EPSS score is below 1 % and the issue is not recorded in the CISA Known Exploited Vulnerabilities catalog, indicating a low likelihood of exploitation. An attacker would need to provoke memory exhaustion within the crypto subsystem, a scenario that is typically local or privileged. The primary risk is a denial of service due to blocked future reads rather than remote code execution or data disclosure.
OpenCVE Enrichment