Description
In the Linux kernel, the following vulnerability has been resolved:

crypto: atmel-sha204a - Fix OOM ->tfm_count leak

If memory allocation fails, decrement ->tfm_count to avoid blocking
future reads.
Published: 2026-04-03
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Atmel SHA204a crypto driver of the Linux kernel can cause the tfm_count counter to be decremented after a memory allocation failure. This incorrect counter modification leads to a resource counter leak and can block subsequent read operations, effectively turning normal crypto requests into delayed or frozen ones. The weakness involves improper resource release, as identified by CWE‑911.

Affected Systems

The vulnerability affects any Linux kernel that includes the Atmel SHA204a driver before the patch series referenced in the advisory. No explicit version list is supplied, so every kernel containing the buggy code path is potentially impacted until the update is applied.

Risk and Exploitability

The CVSS score is not disclosed, yet the EPSS score is below 1 % and the issue is not recorded in the CISA Known Exploited Vulnerabilities catalog, indicating a low likelihood of exploitation. An attacker would need to provoke memory exhaustion within the crypto subsystem, a scenario that is typically local or privileged. The primary risk is a denial of service due to blocked future reads rather than remote code execution or data disclosure.

Generated by OpenCVE AI on April 7, 2026 at 10:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a release that includes the patch commits referenced in the advisory
  • Confirm that the atmel‑sha204a driver module is present and up‑to‑date
  • Monitor system logs for repeated out‑of‑memory errors during crypto operations
  • If a kernel upgrade cannot be applied immediately, restrict the use of the atmel‑sha204a crypto functions in critical workloads

Generated by OpenCVE AI on April 7, 2026 at 10:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 09:15:00 +0000


Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-357

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-357

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: crypto: atmel-sha204a - Fix OOM ->tfm_count leak If memory allocation fails, decrement ->tfm_count to avoid blocking future reads.
Title crypto: atmel-sha204a - Fix OOM ->tfm_count leak
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-18T08:59:14.908Z

Reserved: 2026-03-09T15:48:24.085Z

Link: CVE-2026-31391

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T16:16:37.123

Modified: 2026-04-18T09:16:29.433

Link: CVE-2026-31391

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-31391 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:53:32Z

Weaknesses