Impact
The tegra crypto driver failed to mark its asynchronous algorithms with the CRYPTO_ALG_ASYNC flag. Because of this omission the Linux kernel’s crypto API mistakenly directed synchronous requests to those async algorithms, which caused kernel crashes. The resulting denial of service can bring down any process that relies on the synchronous crypto path, potentially destabilizing services and the entire system.
Affected Systems
The flaw is confined to the Linux kernel’s tegra crypto driver, which is used on NVIDIA Tegra platforms. All kernel releases that contain the driver before the patch commits listed in the supplied references are affected. Any system running an unpatched kernel with this driver is vulnerable.
Risk and Exploitability
No CVSS score is supplied and the EPSS score is unavailable, but the vulnerability is not listed in the CISA KEV catalog and no public exploits are known. The crash requires an attacker to successfully issue a synchronous crypto request that the kernel misroutes to an async algorithm, a scenario that would normally need local or privileged kernel access. Consequently, the risk is moderate and primarily a denial‑of‑service concern rather than a remote code execution vector.
OpenCVE Enrichment