crypto: atmel-sha204a - Fix OOM ->tfm_count leak

Summary

CVECVE-2026-31391
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-04-03 16:16:37 UTC
Updated2026-04-03 16:16:37 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: crypto: atmel-sha204a - Fix OOM ->tfm_count leak If memory allocation fails, decrement ->tfm_count to avoid blocking future reads.

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected da001fb651b00e1deeaf24767dd691ae8152a4f5 66ee9c1c3575b5d6afc340faca00fd40ed5b7ad9 git Not specified
CNA Linux Linux affected da001fb651b00e1deeaf24767dd691ae8152a4f5 2bfc83cee05f8b9604502df27d94e8e2b4a3dbf1 git Not specified
CNA Linux Linux affected da001fb651b00e1deeaf24767dd691ae8152a4f5 1ab70c260cf16f931a728b2cb63fff5f38c814d8 git Not specified
CNA Linux Linux affected da001fb651b00e1deeaf24767dd691ae8152a4f5 6f502049a96b368ea6646c49d9520d6f69a101fa git Not specified
CNA Linux Linux affected da001fb651b00e1deeaf24767dd691ae8152a4f5 fd262dc6d758232511127372eba866b7600739ba git Not specified
CNA Linux Linux affected da001fb651b00e1deeaf24767dd691ae8152a4f5 d240b079a37e90af03fd7dfec94930eb6c83936e git Not specified
CNA Linux Linux affected 5.3 Not specified
CNA Linux Linux unaffected 5.3 semver Not specified
CNA Linux Linux unaffected 6.1.167 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.130 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.78 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.20 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.10 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0-rc3 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/2bfc83cee05f8b9604502df27d94e8e2b4a3dbf1 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/fd262dc6d758232511127372eba866b7600739ba 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/1ab70c260cf16f931a728b2cb63fff5f38c814d8 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/6f502049a96b368ea6646c49d9520d6f69a101fa 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/66ee9c1c3575b5d6afc340faca00fd40ed5b7ad9 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/d240b079a37e90af03fd7dfec94930eb6c83936e 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report